INFO: task kworker/1:1:51 blocked for more than 450 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:1 state:D stack:0 pid:51 tgid:51 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df931d84 r8:00000002 r7:60000113 r6:df931d8c r5:833dec00 r4:833dec00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:833dec00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df931e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84837fc0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:833dec00 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbb5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84beb78c r4:84beb400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84beb78c r4:832a0100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:833dec00 r8:832a012c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:832a0100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:832a0100 r8:80287e08 r7:df879e60 r6:83378280 r5:833dec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf931fb0 to 0xdf931ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:832a1200 INFO: task kworker/1:1:51 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: af58f000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 INFO: task kworker/1:2:719 blocked for more than 450 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:2 state:D stack:0 pid:719 tgid:719 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0455d84 r8:00000002 r7:60000113 r6:e0455d8c r5:83b38c00 r4:83b38c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83b38c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0455e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853e9ac0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83b38c00 r7:00000000 r6:83018200 r5:00001000 r4:7f18b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed3c1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d9638c r4:85d96000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85d9638c r4:83d28b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b38c00 r8:83d28b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:83d28b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83d28b00 r8:80287e08 r7:df879e60 r6:83d28b80 r5:83b38c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0455fb0 to 0xe0455ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:83d2a200 INFO: task kworker/1:2:719 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: afc2d000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 INFO: task kworker/0:3:2887 blocked for more than 450 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:3 state:D stack:0 pid:2887 tgid:2887 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebca9d84 r8:00000002 r7:60000113 r6:ebca9d8c r5:83b45400 r4:83b45400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83b45400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebca9e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a8e740 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83b45400 r7:00000000 r6:83018000 r5:00001000 r4:7f087000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec927000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a59b8c r4:85a59800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a59b8c r4:845d9b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b45400 r8:845d9bac r7:82804d40 r6:dddced80 r5:dddceda0 r4:845d9b80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:845d9b80 r8:80287e08 r7:df845e60 r6:845d9b00 r5:83b45400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebca9fb0 to 0xebca9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:845d7600 INFO: task kworker/0:3:2887 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: afc2d000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 INFO: task kworker/1:0:3095 blocked for more than 450 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:0 state:D stack:0 pid:3095 tgid:3095 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec761d84 r8:00000002 r7:60000113 r6:ec761d8c r5:83ab0c00 r4:83ab0c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83ab0c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec761e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847a3a80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83ab0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f05f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0125000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84bea38c r4:84bea000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84bea38c r4:84a24800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83ab0c00 r8:84a2482c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a24800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a24800 r8:80287e08 r7:df931e60 r6:83cc8a80 r5:83ab0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec761fb0 to 0xec761ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84a2f400 INFO: task kworker/1:0:3095 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: aff80000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 INFO: task kworker/0:4:3119 blocked for more than 450 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:4 state:D stack:0 pid:3119 tgid:3119 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df9d5d84 r8:00000002 r7:60000113 r6:df9d5d8c r5:83a9ec00 r4:83a9ec00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83a9ec00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9d5e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83a9ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f041000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd69000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0f8c r4:84be0c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84be0f8c r4:84a0f000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83a9ec00 r8:84a0f02c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a0f000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a0f000 r8:80287e08 r7:df975e60 r6:83348880 r5:83a9ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9d5fb0 to 0xdf9d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84a39a40 INFO: task kworker/0:4:3119 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: b06ee000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 INFO: task kworker/0:5:3120 blocked for more than 450 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:5 state:D stack:0 pid:3120 tgid:3120 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df9d9d84 r8:00000002 r7:60000013 r6:df9d9d8c r5:83a98c00 r4:83a98c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83a98c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9d9e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bc7940 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83a98c00 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df883000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ac5f8c r4:84ac5c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ac5f8c r4:83348800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83a98c00 r8:8334882c r7:82804d40 r6:dddced80 r5:dddceda0 r4:83348800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83348800 r8:80287e08 r7:df9d5e60 r6:845d6e00 r5:83a98c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9d9fb0 to 0xdf9d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84a39a40 INFO: task kworker/0:5:3120 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: b0c2e000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 INFO: task kworker/0:6:3122 blocked for more than 450 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:6 state:D stack:0 pid:3122 tgid:3122 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df9e1d84 r8:00000002 r7:60000113 r6:df9e1d8c r5:83a9c800 r4:83a9c800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83a9c800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9e1e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85235b40 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83a9c800 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafcb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852a4b8c r4:852a4800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852a4b8c r4:84a2c000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83a9c800 r8:84a2c02c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a2c000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a2c000 r8:80287e08 r7:df9d9e60 r6:84a2c080 r5:83a9c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9e1fb0 to 0xdf9e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84a39a40 INFO: task kworker/0:6:3122 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: b0c2e000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 INFO: task kworker/1:3:3123 blocked for more than 450 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:3 state:D stack:0 pid:3123 tgid:3123 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df9c1d84 r8:00000002 r7:60000013 r6:df9c1d8c r5:84476000 r4:84476000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84476000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9c1e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847e3ac0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84476000 r7:00000000 r6:83018200 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df885000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84beab8c r4:84bea800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84beab8c r4:84a24380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84476000 r8:84a243ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a24380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a24380 r8:80287e08 r7:df931e60 r6:84a24a80 r5:84476000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9c1fb0 to 0xdf9c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84791640 INFO: task kworker/1:3:3123 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: b0f18000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 INFO: task kworker/0:7:3124 blocked for more than 450 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:7 state:D stack:0 pid:3124 tgid:3124 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df9ddd84 r8:00000002 r7:60000113 r6:df9ddd8c r5:84471800 r4:84471800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84471800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9dde08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850edbc0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84471800 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df977000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8516bb8c r4:8516b800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8516bb8c r4:84a2c100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84471800 r8:84a2c12c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a2c100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a2c100 r8:80287e08 r7:df9e1e60 r6:84a24e00 r5:84471800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84a399c0 INFO: task kworker/0:7:3124 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: b0f18000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 INFO: task kworker/1:4:3127 blocked for more than 450 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:4 state:D stack:0 pid:3127 tgid:3127 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df9edd84 r8:00000002 r7:60000113 r6:df9edd8c r5:84474800 r4:84474800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84474800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9ede08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84808d80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84474800 r7:00000000 r6:83018200 r5:00001000 r4:7f037000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd73000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84bebb8c r4:84beb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84bebb8c r4:84a24780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84474800 r8:84a247ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a24780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a24780 r8:80287e08 r7:df931e60 r6:84a24c00 r5:84474800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9edfb0 to 0xdf9edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847919c0 INFO: task kworker/1:4:3127 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: b11ed000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:5:3129 blocked for more than 450 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:5 state:D stack:0 pid:3129 tgid:3129 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df9f9d84 r8:00000002 r7:60000013 r6:df9f9d8c r5:84470000 r4:84470000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84470000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9f9e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850f87c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84470000 r7:00000000 r6:83018200 r5:00001000 r4:7f015000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9aa000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8518c78c r4:8518c400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8518c78c r4:84a24d00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84470000 r8:84a24d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a24d00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a24d00 r8:80287e08 r7:df931e60 r6:84a24980 r5:84470000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f9fb0 to 0xdf9f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84791c40 INFO: task kworker/1:5:3129 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: b11ed000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:6:3131 blocked for more than 450 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:6 state:D stack:0 pid:3131 tgid:3131 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa05d84 r8:00000002 r7:60000113 r6:dfa05d8c r5:83242400 r4:83242400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83242400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa05e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850e3140 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83242400 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbbd000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8516038c r4:85160000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8516038c r4:84a24b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83242400 r8:84a24bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a24b80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a24b80 r8:80287e08 r7:df9f9e60 r6:84a24480 r5:83242400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa05fb0 to 0xdfa05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847919c0 INFO: task kworker/1:6:3131 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: b1336000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:7:3133 blocked for more than 450 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:7 state:D stack:0 pid:3133 tgid:3133 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa11d84 r8:00000002 r7:60000013 r6:dfa11d8c r5:83244800 r4:83244800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83244800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa11e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85254440 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83244800 r7:00000000 r6:83018200 r5:00001000 r4:7f0bb000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae23000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8527db8c r4:8527d800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8527db8c r4:84a24b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83244800 r8:84a24b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a24b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a24b00 r8:80287e08 r7:df9f9e60 r6:84a24c80 r5:83244800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa11fb0 to 0xdfa11ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84791dc0 INFO: task kworker/1:7:3133 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: b176e000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:8:3136 blocked for more than 450 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:8 state:D stack:0 pid:3136 tgid:3136 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa31d84 r8:00000002 r7:60000113 r6:dfa31d8c r5:83a90000 r4:83a90000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83a90000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa31e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8564b4c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83a90000 r7:00000000 r6:83018200 r5:00001000 r4:7f033000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8552db8c r4:8552d800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8552db8c r4:83366b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83a90000 r8:83366b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:83366b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83366b00 r8:80287e08 r7:dfa11e60 r6:83366a80 r5:83a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa31fb0 to 0xdfa31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84791f80 INFO: task kworker/1:8:3136 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: b1a6e000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:9:3137 blocked for more than 450 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:9 state:D stack:0 pid:3137 tgid:3137 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa45d84 r8:00000002 r7:60000013 r6:dfa45d8c r5:83a91800 r4:83a91800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83a91800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa45e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d3c00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83a91800 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0463000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852a478c r4:852a4400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:852a478c r4:830b8480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83a91800 r8:830b84ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:830b8480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830b8480 r8:80287e08 r7:dfa31e60 r6:830b8400 r5:83a91800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa45fb0 to 0xdfa45ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84791dc0 INFO: task kworker/1:9:3137 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: b1a6e000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:8:3139 blocked for more than 450 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:8 state:D stack:0 pid:3139 tgid:3139 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa49d84 r8:00000002 r7:60000113 r6:dfa49d8c r5:83a90c00 r4:83a90c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83a90c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa49e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853e6580 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83a90c00 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa85000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853a238c r4:853a2000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853a238c r4:84a2c180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83a90c00 r8:84a2c1ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a2c180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a2c180 r8:80287e08 r7:df9e1e60 r6:830cc100 r5:83a90c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa49fb0 to 0xdfa49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8478f240 INFO: task kworker/0:8:3139 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: b1b98000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:10:3141 blocked for more than 450 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:10 state:D stack:0 pid:3141 tgid:3141 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa1dd84 r8:00000002 r7:60000113 r6:dfa1dd8c r5:83a93c00 r4:83a93c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83a93c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa1de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85482540 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83a93c00 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0013000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85305f8c r4:85305c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85305f8c r4:830cc400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83a93c00 r8:830cc42c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:830cc400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830cc400 r8:80287e08 r7:dfa31e60 r6:830cc080 r5:83a93c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa1dfb0 to 0xdfa1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84791140 INFO: task kworker/1:10:3141 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: b1b98000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:9:3142 blocked for more than 450 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:9 state:D stack:0 pid:3142 tgid:3142 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa61d84 r8:00000002 r7:60000113 r6:dfa61d8c r5:8389d400 r4:8389d400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8389d400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa61e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8478f280 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8389d400 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853b8b8c r4:853b8800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853b8b8c r4:84a2c200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8389d400 r8:84a2c22c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a2c200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a2c200 r8:80287e08 r7:dfa49e60 r6:830cc380 r5:8389d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa61fb0 to 0xdfa61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8478f440 INFO: task kworker/0:9:3142 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: b224e000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:10:3145 blocked for more than 450 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:10 state:D stack:0 pid:3145 tgid:3145 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa71d84 r8:00000002 r7:60000113 r6:dfa71d8c r5:832e1800 r4:832e1800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:832e1800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa71e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853fbe80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:832e1800 r7:00000000 r6:83018000 r5:00001000 r4:7f09f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb307000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854fbb8c r4:854fb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854fbb8c r4:84a2c280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:832e1800 r8:84a2c2ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a2c280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a2c280 r8:80287e08 r7:dfa61e60 r6:83f79280 r5:832e1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa71fb0 to 0xdfa71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8478f4c0 INFO: task kworker/0:10:3145 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: b2572000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:11:3147 blocked for more than 450 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:11 state:D stack:0 pid:3147 tgid:3147 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa89d84 r8:00000002 r7:60000113 r6:dfa89d8c r5:838be000 r4:838be000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:838be000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa89e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854a1bc0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:838be000 r7:00000000 r6:83018200 r5:00001000 r4:7f015000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa7b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8550878c r4:85508400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8550878c r4:83f79200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:838be000 r8:83f7922c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:83f79200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83f79200 r8:80287e08 r7:dfa31e60 r6:84314c80 r5:838be000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa89fb0 to 0xdfa89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:846203c0 INFO: task kworker/1:11:3147 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: b2572000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:11:3149 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:11 state:D stack:0 pid:3149 tgid:3149 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa8dd84 r8:00000002 r7:60000013 r6:dfa8dd8c r5:8389e000 r4:8389e000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8389e000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa8de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856c8280 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8389e000 r7:00000000 r6:83018000 r5:00001000 r4:7f067000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb08b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85886b8c r4:85886800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85886b8c r4:84a2c300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8389e000 r8:84a2c32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a2c300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a2c300 r8:80287e08 r7:dfa71e60 r6:83cda000 r5:8389e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa8dfb0 to 0xdfa8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8478f680 INFO: task kworker/0:11:3149 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: b2a8e000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:12:3150 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:12 state:D stack:0 pid:3150 tgid:3150 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa99d84 r8:00000002 r7:60000113 r6:dfa99d8c r5:838bb000 r4:838bb000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:838bb000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa99e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854ad0c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:838bb000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb633000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85516b8c r4:85516800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85516b8c r4:84a2c380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:838bb000 r8:84a2c3ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a2c380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a2c380 r8:80287e08 r7:dfa8de60 r6:83cda080 r5:838bb000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa99fb0 to 0xdfa99ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8478f680 INFO: task kworker/0:12:3150 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: b2a8e000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:12:3152 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:12 state:D stack:0 pid:3152 tgid:3152 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfaa5d84 r8:00000002 r7:60000013 r6:dfaa5d8c r5:840ad400 r4:840ad400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:840ad400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaa5e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85590880 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:840ad400 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb56f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85517b8c r4:85517800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85517b8c r4:83cda100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:840ad400 r8:83cda12c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:83cda100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83cda100 r8:80287e08 r7:dfa31e60 r6:83cda180 r5:840ad400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaa5fb0 to 0xdfaa5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84620580 INFO: task kworker/1:12:3152 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: b2f96000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:13:3154 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:13 state:D stack:0 pid:3154 tgid:3154 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfab5d84 r8:00000002 r7:60000113 r6:dfab5d8c r5:840abc00 r4:840abc00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:840abc00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfab5e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8580d940 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:840abc00 r7:00000000 r6:83018000 r5:00001000 r4:7f02f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb467000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85885f8c r4:85885c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85885f8c r4:84a2c400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:840abc00 r8:84a2c42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a2c400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a2c400 r8:80287e08 r7:dfa8de60 r6:83cda200 r5:840abc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfab5fb0 to 0xdfab5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8478f840 INFO: task kworker/0:13:3154 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: b366e000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:13:3156 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:13 state:D stack:0 pid:3156 tgid:3156 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfab9d84 r8:00000002 r7:60000113 r6:dfab9d8c r5:840a8000 r4:840a8000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:840a8000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfab9e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8562c480 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:840a8000 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0db000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8552d38c r4:8552d000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8552d38c r4:83cda280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:840a8000 r8:83cda2ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:83cda280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83cda280 r8:80287e08 r7:dfa31e60 r6:83cda300 r5:840a8000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfab9fb0 to 0xdfab9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84620880 INFO: task kworker/1:13:3156 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: b366e000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:14:3159 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:14 state:D stack:0 pid:3159 tgid:3159 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfab1d84 r8:00000002 r7:60000113 r6:dfab1d8c r5:83a86000 r4:83a86000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83a86000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfab1e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857148c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83a86000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb485000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8552e38c r4:8552e000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8552e38c r4:83cda380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83a86000 r8:83cda3ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:83cda380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83cda380 r8:80287e08 r7:dfa31e60 r6:83cda400 r5:83a86000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfab1fb0 to 0xdfab1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84620e00 INFO: task kworker/1:14:3159 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: b3c01000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:15:3162 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:15 state:D stack:0 pid:3162 tgid:3162 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa5dd84 r8:00000002 r7:60000113 r6:dfa5dd8c r5:83a84800 r4:83a84800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83a84800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa5de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85736980 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83a84800 r7:00000000 r6:83018200 r5:00001000 r4:7f037000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1c3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8579178c r4:85791400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8579178c r4:83cda480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83a84800 r8:83cda4ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:83cda480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83cda480 r8:80287e08 r7:dfab1e60 r6:83cda500 r5:83a84800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa5dfb0 to 0xdfa5dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84620fc0 INFO: task kworker/1:15:3162 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: b3c01000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:16:3164 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:16 state:D stack:0 pid:3164 tgid:3164 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfae1d84 r8:00000002 r7:60000113 r6:dfae1d8c r5:83a81800 r4:83a81800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83a81800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfae1e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8479cd80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83a81800 r7:00000000 r6:83018200 r5:00001000 r4:7f02b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab67000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8471e38c r4:8471e000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8471e38c r4:83cda580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83a81800 r8:83cda5ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:83cda580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83cda580 r8:80287e08 r7:dfa5de60 r6:83cda600 r5:83a81800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfae1fb0 to 0xdfae1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84a35040 INFO: task kworker/1:16:3164 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: b4153000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:17:3165 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:17 state:D stack:0 pid:3165 tgid:3165 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df98dd84 r8:00000002 r7:60000013 r6:df98dd8c r5:83a85400 r4:83a85400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83a85400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df98de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857dc780 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83a85400 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2a1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8552f38c r4:8552f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8552f38c r4:83cda680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83a85400 r8:83cda6ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:83cda680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83cda680 r8:80287e08 r7:dfae1e60 r6:83cda700 r5:83a85400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf98dfb0 to 0xdf98dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84a35040 INFO: task kworker/1:17:3165 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: b46e7000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:18:3167 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:18 state:D stack:0 pid:3167 tgid:3167 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfaedd84 r8:00000002 r7:60000013 r6:dfaedd8c r5:844a0000 r4:844a0000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:844a0000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaede08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847cb240 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:844a0000 r7:00000000 r6:83018200 r5:00001000 r4:7f065000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e4869000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8471e78c r4:8471e400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8471e78c r4:83cda780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844a0000 r8:83cda7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:83cda780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83cda780 r8:80287e08 r7:dfae1e60 r6:83cda800 r5:844a0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaedfb0 to 0xdfaedff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84a35200 INFO: task kworker/1:18:3167 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: b4924000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:19:3169 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:19 state:D stack:0 pid:3169 tgid:3169 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfaf9d84 r8:00000002 r7:60000113 r6:dfaf9d8c r5:844a0c00 r4:844a0c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:844a0c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaf9e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbd740 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:844a0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfabb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858d0f8c r4:858d0c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858d0f8c r4:83cda880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844a0c00 r8:83cda8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:83cda880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83cda880 r8:80287e08 r7:dfaede60 r6:83cda900 r5:844a0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaf9fb0 to 0xdfaf9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84a35340 INFO: task kworker/1:19:3169 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: b4d59000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:20:3170 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:20 state:D stack:0 pid:3170 tgid:3170 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb11d84 r8:00000002 r7:60000113 r6:dfb11d8c r5:844a6000 r4:844a6000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:844a6000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb11e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a35c00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:844a6000 r7:00000000 r6:83018200 r5:00001000 r4:7f06b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7f1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85956b8c r4:85956800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85956b8c r4:83cda980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844a6000 r8:83cda9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:83cda980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83cda980 r8:80287e08 r7:dfaf9e60 r6:83cdaa00 r5:844a6000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb11fb0 to 0xdfb11ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84a35340 INFO: task kworker/1:20:3170 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: b51c7000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:21:3172 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:21 state:D stack:0 pid:3172 tgid:3172 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb1dd84 r8:00000002 r7:60000113 r6:dfb1dd8c r5:83236000 r4:83236000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83236000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb1de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857c97c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83236000 r7:00000000 r6:83018200 r5:00001000 r4:7f02b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb115000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8595678c r4:85956400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8595678c r4:83cdaa80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83236000 r8:83cdaaac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:83cdaa80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83cdaa80 r8:80287e08 r7:dfb11e60 r6:83cdab00 r5:83236000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb1dfb0 to 0xdfb1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84a35440 INFO: task kworker/1:21:3172 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: b530f000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:14:3175 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:14 state:D stack:0 pid:3175 tgid:3175 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb31d84 r8:00000002 r7:60000013 r6:dfb31d8c r5:83b41800 r4:83b41800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83b41800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb31e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a8e540 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83b41800 r7:00000000 r6:83018000 r5:00001000 r4:7f085000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8fb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a5978c r4:85a59400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a5978c r4:84a2c480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b41800 r8:84a2c4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a2c480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a2c480 r8:80287e08 r7:dfa8de60 r6:83cdab80 r5:83b41800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb31fb0 to 0xdfb31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8478fe80 INFO: task kworker/0:14:3175 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: b5720000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:22:3178 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:22 state:D stack:0 pid:3178 tgid:3178 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb2dd84 r8:00000002 r7:60000113 r6:dfb2dd8c r5:83b46000 r4:83b46000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83b46000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb2de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84807d00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83b46000 r7:00000000 r6:83018200 r5:00001000 r4:7f029000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd5b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85956f8c r4:85956c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85956f8c r4:83cdac00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b46000 r8:83cdac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:83cdac00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83cdac00 r8:80287e08 r7:dfb11e60 r6:83cdac80 r5:83b46000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb2dfb0 to 0xdfb2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84a35b40 INFO: task kworker/1:22:3178 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: b5bdd000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:23:3180 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:23 state:D stack:0 pid:3180 tgid:3180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb21d84 r8:00000002 r7:60000013 r6:dfb21d8c r5:83b43c00 r4:83b43c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83b43c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb21e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b15dc0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83b43c00 r7:00000000 r6:83018200 r5:00001000 r4:7f029000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0451000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85adc78c r4:85adc400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85adc78c r4:83cdad00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b43c00 r8:83cdad2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:83cdad00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83cdad00 r8:80287e08 r7:dfb2de60 r6:83cdad80 r5:83b43c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb21fb0 to 0xdfb21ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84a35bc0 INFO: task kworker/1:23:3180 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: b5bdd000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:24:3181 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:24 state:D stack:0 pid:3181 tgid:3181 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb4dd84 r8:00000002 r7:60000113 r6:dfb4dd8c r5:83b40000 r4:83b40000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83b40000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb4de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a7cb00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83b40000 r7:00000000 r6:83018200 r5:00001000 r4:7f0df000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecebb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85957b8c r4:85957800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85957b8c r4:83cdae00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b40000 r8:83cdae2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:83cdae00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83cdae00 r8:80287e08 r7:dfb21e60 r6:83cdae80 r5:83b40000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb4dfb0 to 0xdfb4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84a35bc0 INFO: task kworker/1:24:3181 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: b5f9a000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:25:3185 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:25 state:D stack:0 pid:3185 tgid:3185 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb59d84 r8:00000002 r7:60000113 r6:dfb59d8c r5:83252400 r4:83252400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83252400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb59e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853e9cc0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83252400 r7:00000000 r6:83018200 r5:00001000 r4:7f18f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed441000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d96b8c r4:85d96800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85d96b8c r4:83cdaf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83252400 r8:83cdaf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:83cdaf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83cdaf00 r8:80287e08 r7:dfb21e60 r6:83cdaf80 r5:83252400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb59fb0 to 0xdfb59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84a44140 INFO: task kworker/1:25:3185 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: b6354000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:15:3186 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:15 state:D stack:0 pid:3186 tgid:3186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb71d84 r8:00000002 r7:60000113 r6:dfb71d8c r5:83a9d400 r4:83a9d400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83a9d400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb71e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a8e800 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83a9d400 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec94b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a59f8c r4:85a59c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a59f8c r4:84a2c500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83a9d400 r8:84a2c52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a2c500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a2c500 r8:80287e08 r7:dfb31e60 r6:84a2c580 r5:83a9d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb71fb0 to 0xdfb71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8478fa80 INFO: task kworker/0:15:3186 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: b66dd000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:26:3187 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:26 state:D stack:0 pid:3187 tgid:3187 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb79d84 r8:00000002 r7:60000113 r6:dfb79d8c r5:83a9e000 r4:83a9e000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83a9e000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb79e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85591540 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83a9e000 r7:00000000 r6:83018200 r5:00001000 r4:7f0e5000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed61b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d04f8c r4:85d04c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85d04f8c r4:83cc8a00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83a9e000 r8:83cc8a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:83cc8a00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83cc8a00 r8:80287e08 r7:dfb59e60 r6:84a2c600 r5:83a9e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb79fb0 to 0xdfb79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84a44440 INFO: task kworker/1:26:3187 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: b66dd000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:16:3190 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:16 state:D stack:0 pid:3190 tgid:3190 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb65d84 r8:00000002 r7:60000113 r6:dfb65d8c r5:83a98000 r4:83a98000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83a98000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb65e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r4:00000000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:e058ddc0 r5:84be038c r4:84be0000 r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 Exception stack(0xe058dfb0 to 0xe058dff8) Workqueue: events bpf_prog_free_deferred r5:83a99800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb7de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a8ec40 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83a99800 r7:00000000 r6:83018000 r5:00001000 r4:7f091000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb27000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a5af8c r4:85a5ac00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a5af8c r4:84a2c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83a99800 r8:84a2c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a2c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a2c780 r8:80287e08 r7:dfb65e60 r6:84a2c800 r5:83a99800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb7dfb0 to 0xdfb7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:844de140 INFO: task kworker/0:17:3192 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: b6ccf000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xe058dfb0 to 0xe058dff8) task:kworker/0:18 state:D stack:0 pid:3193 tgid:3193 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb05e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a8ea00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83a9a400 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec99f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a5a78c r4:85a5a400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:84a2c880 r8:80287e08 r7:dfb7de60 r6:84a2c900 r5:83a9a400 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 r5:00001000 r4:dfb45000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a8eb40 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 dd20: b720b000 dfadb000 00000001 80239b98 7f2f7000 00000001 r4:00000000 r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb99e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a8ef40 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:833dbc00 r7:00000000 r6:83018000 r5:00001000 r4:7f097000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb6b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a5bb8c r4:85a5b800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a5bb8c r4:84a2ca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:833dbc00 r8:84a2caac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a2ca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a2ca80 r8:80287e08 r7:dfb7de60 r6:84a2cb00 r5:833dbc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb99fb0 to 0xdfb99ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:844de540 INFO: task kworker/0:20:3199 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: b720b000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r4:82ac21e4 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/0:21 state:D stack:0 pid:3200 tgid:3200 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:85a5b38c r4:85a5b000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:84a2cb80 r8:80287e08 r7:dfb99e60 r6:84a2cc00 r5:83b3a400 INFO: task kworker/0:21:3200 is blocked on a mutex likely owned by task kworker/1:201:3654. dd60: 80230ad0 80239bb0 80000113 ffffffff r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:27:3202 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:27 state:D stack:0 pid:3202 tgid:3202 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfbb1d84 r8:00000002 r7:60000113 r6:dfbb1d8c r5:83b3c800 r4:83b3c800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83b3c800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbb1e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85d9678c r4:85d96400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 Exception stack(0xe058dfb0 to 0xe058dff8) INFO: task kworker/0:22:3204 blocked for more than 451 seconds. [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:83b3bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f095000 r5:85a5b78c r4:85a5b400 r4:84a2cd00 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 r4:82ac21e4 r5:00001000 r4:dfb45000 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbc5e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b1d280 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83aa9800 r7:00000000 r6:83018000 r5:00001000 r4:7f09b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb91000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85b5838c r4:85b58000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85b5838c r4:84a2ce00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83aa9800 r8:84a2ce2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a2ce00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a2ce00 r8:80287e08 r7:dfb99e60 r6:84a2ce80 r5:83aa9800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbc5fb0 to 0xdfbc5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:844dea00 INFO: task kworker/0:23:3206 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: b7ba9000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r5:84be038c r4:84be0000 r4:00000001 r4:84ba8680 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbd1e08 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:85b5878c r4:84a2cf00 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 dd20: b7ba9000 dfadb000 00000001 80239b98 7f2f7000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:25:3210 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:25 state:D stack:0 pid:3210 tgid:3210 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfbddd84 r8:00000002 r7:60000113 r6:dfbddd8c r5:84213c00 r4:84213c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84213c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbdde08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b1d500 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:ecbbf000 r5:85b58b8c r4:85b58800 r10:61c88647 r9:84213c00 r8:8479902c r7:82804d40 r6:dddced80 r5:dddceda0 Call trace: r5:80000113 r4:80239bb0 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:85b5938c r4:85b59000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85b5938c r4:84799100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84210000 r8:8479912c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84799100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84799100 r8:80287e08 r7:dfbdde60 r6:84799180 r5:84210000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbe9fb0 to 0xdfbe9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84798000 INFO: task kworker/0:26:3212 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: b837b000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84211800 [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbf5e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b1d600 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84211800 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecbdb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85b58f8c r4:85b58c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85b58f8c r4:84799200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84211800 r8:8479922c r7:82804d40 r6:dddced80 r5:dddceda0 task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r4:84bbbe80 dfa0: 00000000 00000000 00000000 00000000 r5:84216000 r4:8291a680 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:85b5978c r4:85b59400 r4:84799380 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Exception stack(0xe058dd28 to 0xe058dd70) r4:82ac21e4 r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 Not tainted 6.15.0-rc7-syzkaller #0 r5:84a50000 r4:8291a680 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:85b59b8c r4:85b59800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xdfc0dfb0 to 0xdfc0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84798340 INFO: task kworker/0:29:3218 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: b89db000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:30:3220 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:30 state:D stack:0 pid:3220 tgid:3220 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r4:84a50c00 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:85b5a78c r4:85b5a400 r10:61c88647 r9:84a50c00 r8:8479952c r7:82804d40 r6:dddced80 r5:dddceda0 task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 Exception stack(0xe058dfb0 to 0xe058dff8) [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r9:83018005 r8:84a51800 r7:00000000 r6:83018000 r5:00001000 r4:7f015000 r10:61c88647 r9:84a51800 r8:847996ac r7:82804d40 r6:dddced80 r5:dddceda0 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: b8e4f000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:32:3224 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:32 state:D stack:0 pid:3224 tgid:3224 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfc31d84 r8:00000002 r7:60000113 r6:dfc31d8c r5:84a52400 r4:84a52400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a52400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc31e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a807c0 r5:85b5a38c r4:85b5a000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84a52400 r8:847997ac r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xdfc31fb0 to 0xdfc31ff8) task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 dd60: 80230ad0 80239bb0 80000113 ffffffff r4:e058ddc0 r5:00001000 r4:dfb45000 r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 r5:85ae738c r4:85ae7000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:84799880 Exception stack(0xdfc3dfb0 to 0xdfc3dff8) INFO: task kworker/0:33:3226 is blocked on a mutex likely owned by task kworker/1:201:3654. dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 INFO: task kworker/0:34:3228 blocked for more than 451 seconds. r4:84a53c00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc49e08 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85b5ab8c r4:85b5a800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85b5ab8c r4:84799980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a53c00 r8:847999ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84799980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84799980 r8:80287e08 r7:dfc3de60 r6:84799a00 r5:84a53c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc49fb0 to 0xdfc49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84798b00 INFO: task kworker/0:34:3228 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: b933f000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:35:3230 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:35 state:D stack:0 pid:3230 tgid:3230 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfc55d84 r8:00000002 r7:60000113 r6:dfc55d8c r5:84a54800 r4:84a54800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a54800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc55e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a80500 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a54800 r7:00000000 r6:83018000 r5:00001000 r4:7f0bd000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed001000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85b5af8c r4:85b5ac00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85b5af8c r4:84799a80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a54800 r8:84799aac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84799a80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84799a80 r8:80287e08 r7:dfc49e60 r6:84799b00 r5:84a54800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: b962b000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 r5:85b5b38c r4:85b5b000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85b5b38c r4:84799b80 r10:61c88647 r9:84a55400 r8:84799bac r7:82804d40 r6:dddced80 r5:dddceda0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe058dd28 to 0xe058dd70) r4:82ac21e4 r4:00000000 r5:84be038c r4:84be0000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r9:83018005 r8:84a56000 r7:00000000 r6:83018000 r5:00001000 r4:7f071000 r5:85b5b78c r4:85b5b400 r7:dddced80 r6:83018000 r5:85b5b78c r4:84799c80 r10:00000000 r9:84799c80 r8:80287e08 r7:dfc61e60 r6:84799d00 r5:84a56000 INFO: task kworker/0:37:3235 is blocked on a mutex likely owned by task kworker/1:201:3654. Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: b9d13000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:38:3236 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:38 state:D stack:0 pid:3236 tgid:3236 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfc79d84 r8:00000002 r7:60000113 r6:dfc79d8c r5:84a56c00 r4:84a56c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a56c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc79e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a63a80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a56c00 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec5a7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85b5bb8c r4:85b5b800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85b5bb8c r4:84799d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a56c00 r8:84799dac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84799d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84799d80 r8:80287e08 r7:dfc6de60 r6:84799e00 r5:84a56c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc79fb0 to 0xdfc79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847af240 INFO: task kworker/0:38:3236 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:82ac21e4 r4:e058ddc0 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85b6838c r4:84799e80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:843f0000 r8:84799eac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84799e80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84799e80 r8:80287e08 r7:dfc79e60 r6:84799f00 r5:843f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc85fb0 to 0xdfc85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847af340 INFO: task kworker/0:39:3239 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: ba085000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:40:3240 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:40 state:D stack:0 pid:3240 tgid:3240 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfc91d84 r8:00000002 r7:60000113 r6:dfc91d8c r5:843f0c00 [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a63b40 r5:85b6878c r4:85b68400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred dd20: ba085000 dfadb000 00000001 80239b98 7f2f7000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r9:83018005 r8:843f1800 r7:00000000 r6:83018000 r5:00001000 r4:7f0c3000 r5:85b68b8c r4:85b68800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xdfc9dfb0 to 0xdfc9dff8) task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:42:3244 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:42 state:D stack:0 pid:3244 tgid:3244 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfcb9d84 r8:00000002 r7:60000113 r6:dfcb9d8c r5:84469800 r4:84469800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84469800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcb9e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a63340 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84469800 r7:00000000 r6:83018000 r5:00001000 r4:7f0c5000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb57000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85b68f8c r4:85b68c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85b68f8c r4:847b4180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84469800 r8:847b41ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:847b4180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847b4180 r8:80287e08 r7:dfc9de60 r6:8478e080 r5:84469800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfcb9fb0 to 0xdfcb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847af640 INFO: task kworker/0:42:3244 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: ba637000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:843f2400 r4:8291a680 r4:00000000 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: dd20: ba7c2000 dfadb000 00000001 80239b98 7f2f7000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r5:84be038c r4:84be0000 r4:84bbbe80 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:843f3000 r7:00000000 r6:83018000 r5:00001000 r4:7f0c9000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85b6978c r4:85b69400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85b6978c r4:847b4300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:843f3000 r8:847b432c r7:82804d40 r6:dddced80 r5:dddceda0 r4:847b4300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847b4300 r8:80287e08 r7:dfcb5e60 r6:847b4380 r5:843f3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfcc5fb0 to 0xdfcc5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847af880 INFO: task kworker/0:44:3248 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: ba7c2000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:45:3251 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:45 state:D stack:0 pid:3251 tgid:3251 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfcd1d84 r8:00000002 r7:60000013 r6:dfcd1d8c r5:843f3c00 r4:843f3c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:843f3c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:847b4400 r8:80287e08 r7:dfcc5e60 r6:847b4480 r5:843f3c00 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: dd20: bab6d000 dfadb000 00000001 80239b98 7f2f7000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:84ba8680 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:85b69b8c r4:85b69800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:847b4500 r8:80287e08 r7:dfcd1e60 r6:8478e100 r5:84468c00 INFO: task kworker/0:46:3252 is blocked on a mutex likely owned by task kworker/1:201:3654. Exception stack(0xe058dd28 to 0xe058dd70) r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:47:3254 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:47 state:D stack:0 pid:3254 tgid:3254 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfcfdd84 r8:00000002 r7:60000113 r6:dfcfdd8c r5:84468000 r4:84468000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84468000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcfde08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a79c40 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84468000 r7:00000000 r6:83018000 r5:00001000 r4:7f0f7000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed145000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85b69f8c r4:85b69c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85b69f8c r4:847b4580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84468000 r8:847b45ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:847b4580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847b4580 r8:80287e08 r7:dfcf5e60 r6:8478e180 r5:84468000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfcfdfb0 to 0xdfcfdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847afb80 INFO: task kworker/0:47:3254 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: bb08c000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd15e08 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 r4:e058ddc0 r5:00001000 r4:dfb45000 r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r4:8446c800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8446c800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd1de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8580ff00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8446c800 r7:00000000 r6:83018000 r5:00001000 r4:7f0ed000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed107000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c1578c r4:85c15400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c1578c r4:847b4680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8446c800 r8:847b46ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:847b4680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847b4680 r8:80287e08 r7:dfd15e60 r6:8478e280 r5:8446c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd1dfb0 to 0xdfd1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847afec0 INFO: task kworker/0:49:3258 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: bb10c000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:85b6a78c r4:85b6a400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xdfd29fb0 to 0xdfd29ff8) INFO: task kworker/0:50:3260 is blocked on a mutex likely owned by task kworker/1:201:3654. Exception stack(0xe058dd28 to 0xe058dd70) r4:82ac21e4 r4:00000000 r5:84be038c r4:84be0000 r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:84ba8680 Workqueue: events bpf_prog_free_deferred [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85826ac0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8446d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0e9000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed0eb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c14f8c r4:85c14c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c14f8c r4:847b4780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8446d400 r8:847b47ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:847b4780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847b4780 r8:80287e08 r7:dfd1de60 r6:8478e380 r5:8446d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd35fb0 to 0xdfd35ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847c8100 INFO: task kworker/0:51:3261 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: bba94000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:28:3268 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:28 state:D stack:0 pid:3268 tgid:3268 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:8446e000 r4:8291a680 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:85d9738c r4:8478e400 r10:00000000 r9:8478e400 r8:80287e08 r7:dfb59e60 r6:8478e480 r5:8446e000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xe058dd28 to 0xe058dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:29:3270 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:29 state:D stack:0 pid:3270 tgid:3270 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfce9d84 r8:00000002 r7:60000013 r6:dfce9d8c r5:8446ec00 r4:8446ec00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8446ec00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfce9e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f6840 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8446ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f19b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed84d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d97f8c r4:85d97c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85d97f8c r4:8478e500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8446ec00 r8:8478e52c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8478e500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8478e500 r8:80287e08 r7:dfd41e60 r6:8478e580 r5:8446ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfce9fb0 to 0xdfce9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847b5a40 INFO: task kworker/1:29:3270 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: bc133000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:84ba8680 Not tainted 6.15.0-rc7-syzkaller #0 r4:8446a400 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9bde08 r4:00000000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85e0c38c r4:85e0c000 r10:61c88647 r9:8446a400 r8:8478e62c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xe058dd28 to 0xe058dd70) r4:82ac21e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:52:3272 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:52 state:D stack:0 pid:3272 tgid:3272 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df9f5d84 r8:00000002 r7:60000013 r6:df9f5d8c r5:838ae000 r4:838ae000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:838ae000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858313c0 r5:85c1638c r4:85c16000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f5fb0 to 0xdf9f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847c85c0 INFO: task kworker/0:52:3272 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: bc74a000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:31:3276 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:31 state:D stack:0 pid:3276 tgid:3276 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa01d84 r8:00000002 r7:60000013 r6:dfa01d8c r5:84238000 r4:84238000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85d97b8c r4:85d97800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:8478e880 1fa0: 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe058dd28 to 0xe058dd70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xe058dfb0 to 0xe058dff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:84238c00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa0de08 r4:00000000 r5:85b6af8c r4:85b6ac00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:847b4900 r8:80287e08 r7:df9d1e60 r6:8478ea00 r5:84238c00 task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:32:3280 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:32 state:D stack:0 pid:3280 tgid:3280 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa2dd84 r8:00000002 r7:60000013 r6:dfa2dd8c r5:84239800 r4:84239800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84239800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa2de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853e9440 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84239800 r7:00000000 r6:83018200 r5:00001000 r4:7f195000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed5f3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d9778c r4:85d97400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85d9778c r4:8478e980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84239800 r8:8478e9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8478e980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8478e980 r8:80287e08 r7:dfa01e60 r6:8478ea80 r5:84239800 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xe058dd28 to 0xe058dd70) [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:8291a684 r9:dfaa1d84 r8:00000002 r7:60000113 r6:dfaa1d8c r5:8423c800 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaa1e08 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85b6b38c r4:85b6b000 r10:61c88647 r9:8423c800 r8:847b49ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:847c8a40 Call trace: Exception stack(0xe058dd28 to 0xe058dd70) [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:56:3286 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:56 state:D stack:0 pid:3286 tgid:3286 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfac9d84 r8:00000002 r7:60000013 r6:dfac9d8c r5:8423e000 r4:8423e000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8423e000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfac9e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857c7340 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8423e000 r7:00000000 r6:83018000 r5:00001000 r4:7f0b3000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecbe3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85b6bb8c r4:85b6b800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85b6bb8c r4:847b4a00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8423e000 r8:847b4a2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:847b4a00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847b4a00 r8:80287e08 r7:df9d1e60 r6:8478ed80 r5:8423e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfac9fb0 to 0xdfac9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847c8b80 INFO: task kworker/0:56:3286 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: bd375000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:84bbe680 r8:80287e08 r7:e04f9e60 r6:84bbe700 r5:84af9800 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xe058dd28 to 0xe058dd70) [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:71:3628 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:71 state:D stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e051dd84 r8:00000002 r7:60000113 r6:e051dd8c r5:84afbc00 r4:84afbc00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84afbc00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e051de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84baa5c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84afbc00 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ac4b8c r4:84ac4800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ac4b8c r4:84bbe880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afbc00 r8:84bbe8ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84bbe880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbe880 r8:80287e08 r7:e04ede60 r6:84bbe900 r5:84afbc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe051dfb0 to 0xe051dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84bb9280 INFO: task kworker/0:71:3628 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: bd948000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:84bbbe80 Exception stack(0xe058dfb0 to 0xe058dff8) INFO: task kworker/1:202:3656 blocked for more than 452 seconds. [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 INFO: task kworker/1:202:3656 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd60: 80230ad0 80239bb0 80000113 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r5:84be038c r4:84be0000 r4:84bbbe80 Exception stack(0xe058dfb0 to 0xe058dff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred r4:84b08000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b08000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05b5e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8e00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08000 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd81000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be138c r4:84be1000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be138c r4:84bbbf80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08000 r8:84bbbfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf80 r8:80287e08 r7:e05ade60 r6:84bc4000 r5:84b08000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05b5fb0 to 0xe05b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba86c0 INFO: task kworker/1:203:3658 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) Exception stack(0xe058dd28 to 0xe058dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 INFO: task kworker/1:204:3660 blocked for more than 452 seconds. r5:84b08c00 r4:8291a680 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fa0: 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe058dd28 to 0xe058dd70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:205:3664 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:205 state:D stack:0 pid:3664 tgid:3664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e04fdd84 r8:00000002 r7:60000013 r6:e04fdd8c r5:84355400 r4:84355400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84355400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04fde08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bb6380 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84355400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfda7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be1b8c r4:84be1800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be1b8c r4:84bb2080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84355400 r8:84bb20ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2080 r8:80287e08 r7:e05b5e60 r6:84bb2100 r5:84355400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04fdfb0 to 0xe04fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8bc0 INFO: task kworker/1:205:3664 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe058dd28 to 0xe058dd70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:84bbbe80 Exception stack(0xe058dfb0 to 0xe058dff8) INFO: task kworker/1:206:3665 blocked for more than 452 seconds. r4:83b58c00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0541e08 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:84be178c r4:84be1400 r4:84bb2180 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0541fb0 to 0xe0541ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84bb6100 INFO: task kworker/1:206:3665 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: be481000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:207:3667 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:207 state:D stack:0 pid:3667 tgid:3667 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r5:84968c00 r4:8291a680 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf1c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84968c00 r7:00000000 r6:83018200 r5:00001000 r4:7f049000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdbb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be1f8c r4:84be1c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be1f8c r4:84bb2280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84968c00 r8:84bb22ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2280 r8:80287e08 r7:e04fde60 r6:84bb2300 r5:84968c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d5fb0 to 0xe05d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84bbf100 INFO: task kworker/1:207:3667 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 dd60: 80230ad0 80239bb0 80000113 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r5:00001000 r4:dfb45000 r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 Exception stack(0xe058dfb0 to 0xe058dff8) INFO: task kworker/1:208:3669 blocked for more than 452 seconds. r5:8496a400 r4:8291a680 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fa0: 00000000 00000000 00000000 00000000 Call trace: dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:209:3670 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:209 state:D stack:0 pid:3670 tgid:3670 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e05e1d84 r8:00000002 r7:60000113 r6:e05e1d8c r5:84968000 r4:84968000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84968000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05e1e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf940 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84968000 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be238c r4:84be2000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be238c r4:84bb2480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84968000 r8:84bb24ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2480 r8:80287e08 r7:e05d9e60 r6:84bb2500 r5:84968000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84bbf280 INFO: task kworker/1:209:3670 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) dd60: 80230ad0 80239bb0 80000113 ffffffff r4:e058ddc0 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84bbbe80 Exception stack(0xe058dfb0 to 0xe058dff8) INFO: task kworker/0:72:3673 blocked for more than 452 seconds. r4:8496bc00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05f9e08 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred Exception stack(0xe058dd28 to 0xe058dd70) [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:73 state:D stack:0 pid:3674 tgid:3674 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r9:83018005 r8:8496c800 r7:00000000 r6:83018000 r5:00001000 r4:7f069000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00f1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ac538c r4:84ac5000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ac538c r4:84bc4180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8496c800 r8:84bc41ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84bc4180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bc4180 r8:80287e08 r7:e05f9e60 r6:84bb2600 r5:8496c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05fdfb0 to 0xe05fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84baa8c0 INFO: task kworker/0:73:3674 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: bf229000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:210:3677 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:210 state:D stack:0 pid:3677 tgid:3677 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0605d84 r8:00000002 r7:60000013 r6:e0605d8c r5:8496d400 r4:8496d400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8496d400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0605e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbfc40 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8496d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:84be2b8c r4:84be2800 r10:61c88647 r9:8496d400 r8:84bb26ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe058dd28 to 0xe058dd70) [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:211:3679 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:211 state:D stack:0 pid:3679 tgid:3679 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e060dd84 r8:00000002 r7:60000013 r6:e060dd8c r5:84969800 r4:84969800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84969800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e060de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbfe40 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84969800 r7:00000000 r6:83018200 r5:00001000 r4:7f055000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe41000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be2f8c r4:84be2c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be2f8c r4:84bb2780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84969800 r8:84bb27ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2780 r8:80287e08 r7:e0605e60 r6:84bb2800 r5:84969800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84bbf880 INFO: task kworker/1:211:3679 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: bf229000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:8291a684 r9:e0619d84 r8:00000002 r7:60000113 r6:e0619d8c r5:8496b000 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:84be338c r4:84be3000 r7:ddde2d80 r6:83018200 r5:84be338c r4:84bb2880 r10:00000000 r9:84bb2880 r8:80287e08 r7:e060de60 r6:84bb2900 r5:8496b000 r4:84bbf980 Exception stack(0xe058dd28 to 0xe058dd70) r4:e058ddc0 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:213:3684 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:213 state:D stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e05f5d84 r8:00000002 r7:60000113 r6:e05f5d8c r5:8496ec00 r4:8496ec00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8496ec00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05f5e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8496ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e001b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:84be378c r4:84be3400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) INFO: task kworker/1:213:3684 is blocked on a mutex likely owned by task kworker/1:201:3654. r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r5:8496e000 r4:8291a680 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba7380 r10:61c88647 r9:8496e000 r8:84bb2aac r7:82804d40 r6:ddde2d80 r5:ddde2da0 task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 Workqueue: events bpf_prog_free_deferred r4:00000000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:84be3b8c r4:84be3800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be3b8c r4:84bb2b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84356c00 r8:84bb2bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2b80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2b80 r8:80287e08 r7:e0571e60 r6:84bb2c00 r5:84356c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe061dfb0 to 0xe061dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba7000 INFO: task kworker/1:215:3686 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: bfada000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 Not tainted 6.15.0-rc7-syzkaller #0 [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:84be838c r4:84be8000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fa0: 00000000 00000000 00000000 00000000 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 r5:84be038c r4:84be0000 r4:00000001 Not tainted 6.15.0-rc7-syzkaller #0 [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:84be878c r4:84be8400 r10:61c88647 r9:84368000 r8:84bb2dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0625fb0 to 0xe0625ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba7340 INFO: task kworker/1:217:3691 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: bfeff000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:84ba8680 r10:8291a684 r9:e0629d84 r8:00000002 r7:60000013 r6:e0629d8c r5:84368c00 r4:00000000 r5:84be8b8c r4:84be8800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Exception stack(0xe058dd28 to 0xe058dd70) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:219:3695 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:219 state:D stack:0 pid:3695 tgid:3695 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e062dd84 r8:00000002 r7:60000113 r6:e062dd8c r5:84369800 r4:84369800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84369800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e062de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba7980 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84369800 r7:00000000 r6:83018200 r5:00001000 r4:7f065000 r5:84be8f8c r4:84be8c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred dd60: 80230ad0 80239bb0 80000113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 Not tainted 6.15.0-rc7-syzkaller #0 r5:8436a400 r4:8291a680 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0631e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba7ac0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8436a400 r7:00000000 r6:83018200 r5:00001000 r4:7f067000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be938c r4:84be9000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be938c r4:84bc9080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8436a400 r8:84bc90ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bc9080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bc9080 r8:80287e08 r7:e062de60 r6:84bc9100 r5:8436a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba7800 INFO: task kworker/1:220:3697 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: c08fc000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r4:8436bc00 r5:8436bc00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0635e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84baa380 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8436bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0131000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be9b8c r4:84be9800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be9b8c r4:84bc9180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8436bc00 r8:84bc91ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bc9180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bc9180 r8:80287e08 r7:e0631e60 r6:84bc9200 r5:8436bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba7940 INFO: task kworker/1:221:3699 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 r4:e058ddc0 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:84b0a400 r4:8291a680 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bc7a40 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84b0a400 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df961000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ac638c r4:84ac6000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ac638c r4:84bc4200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b0a400 r8:84bc422c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84bc4200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bc4200 r8:80287e08 r7:e05f9e60 r6:84bc4280 r5:84b0a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0611fb0 to 0xe0611ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84bc7480 INFO: task kworker/0:74:3702 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: c0d2e000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:75:3703 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:75 state:D stack:0 pid:3703 tgid:3703 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0639d84 r8:00000002 r7:60000113 r6:e0639d8c r5:84b0b000 r4:84b0b000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b0b000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0639e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bc77c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84b0b000 r7:00000000 r6:83018000 r5:00001000 r4:7f06f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0123000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ac5b8c r4:84ac5800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ac5b8c r4:84bc4300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b0b000 r8:84bc432c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84bc4300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bc4300 r8:80287e08 r7:e0611e60 r6:84bc4380 r5:84b0b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0639fb0 to 0xe0639ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84bc7480 INFO: task kworker/0:75:3703 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: c0d2e000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r5:84be038c r4:84be0000 r4:84bbbe80 Exception stack(0xe058dfb0 to 0xe058dff8) INFO: task kworker/1:222:3705 blocked for more than 452 seconds. r4:8436d400 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0641e08 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:84be978c r4:84bc9280 r10:00000000 r9:84bc9280 r8:80287e08 r7:e0635e60 r6:84bc9300 r5:8436d400 INFO: task kworker/1:222:3705 is blocked on a mutex likely owned by task kworker/1:201:3654. dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfa0: 00000000 00000000 00000000 00000000 task:kworker/0:76 state:D stack:0 pid:3707 tgid:3707 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e063dd84 r8:00000002 r7:60000113 r6:e063dd8c r5:84b0bc00 r4:84b0bc00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b0bc00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e063de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bc7b40 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84b0bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f075000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfba9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ac678c r4:84ac6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ac678c r4:84bc4400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b0bc00 r8:84bc442c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84bc4400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bc4400 r8:80287e08 r7:e0611e60 r6:84bc4480 r5:84b0bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe063dfb0 to 0xe063dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84bc7640 INFO: task kworker/0:76:3707 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: c0f88000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bc7e80 r5:84ac6f8c r4:84ac6c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ac6f8c r4:84bc4500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b0c800 r8:84bc452c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84bc4500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bc4500 r8:80287e08 r7:e063de60 r6:84bc4580 r5:84b0c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0645fb0 to 0xe0645ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84bc78c0 INFO: task kworker/0:77:3712 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: c1931000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:84b0d400 r4:8291a680 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dffb1e08 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:84ac6b8c r4:84ac6800 r10:61c88647 r9:84b0d400 r8:84bc462c r7:82804d40 r6:dddced80 r5:dddceda0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: c1931000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:223:3715 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:223 state:D stack:0 pid:3715 tgid:3715 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r4:84b0e000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0441e08 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:84713b8c r4:84713800 r7:ddde2d80 r6:83018200 r5:84713b8c r4:84bc9380 r10:00000000 r9:84bc9380 r8:80287e08 r7:e0635e60 r6:84bc4700 r5:84b0e000 INFO: task kworker/1:223:3715 is blocked on a mutex likely owned by task kworker/1:201:3654. Exception stack(0xe058dd28 to 0xe058dd70) [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-rc7-syzkaller #0 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e04c5d84 r8:00000002 r7:60000113 r6:e04c5d8c r5:8436e000 r4:8436e000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8436e000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04c5e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:843e2d00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8436e000 r7:00000000 r6:83018200 r5:00001000 r4:7f0cb000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0759000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be9f8c r4:84be9c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be9f8c r4:84bc9400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8436e000 r8:84bc942c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bc9400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bc9400 r8:80287e08 r7:e0441e60 r6:84bc9480 r5:8436e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04c5fb0 to 0xe04c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba9040 INFO: task kworker/1:224:3717 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: c20cb000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:8291a684 r9:e0499d84 r8:00000002 r7:60000113 r6:e0499d8c r5:84b0ec00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0499e08 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:84ac738c r4:84ac7000 r7:dddced80 r6:83018000 r5:84ac738c r4:84bc4780 r10:61c88647 r9:84b0ec00 r8:84bc47ac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: c20cb000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:80:3720 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:80 state:D stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e04d1d84 r8:00000002 r7:60000013 r6:e04d1d8c r5:84b09800 r4:84b09800 r5:84b09800 r4:8291a680 r4:00000000 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ac778c r4:84ac7400 r7:dddced80 r6:83018000 r5:84ac778c r4:84bc4880 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: c20cb000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xe058dfb0 to 0xe058dff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:84990000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04a5e08 r9:83018005 r8:84990000 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 r5:844d478c r4:844d4400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:844d478c r4:84bc4980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84990000 r8:84bc49ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84bc4980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bc4980 r8:80287e08 r7:e04d1e60 r6:84bc4a00 r5:84990000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04a5fb0 to 0xe04a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84bc7e40 INFO: task kworker/0:81:3722 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: c20cb000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:00001000 r4:dfb45000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:82:3725 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:82 state:D stack:0 pid:3725 tgid:3725 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e04ddd84 r8:00000002 r7:60000113 r6:e04ddd8c r5:84990c00 r4:84990c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84990c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04dde08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:00001000 r4:dfcbf000 r5:84ac7b8c r4:84ac7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:84bc4a80 dfa0: 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe058dd28 to 0xe058dd70) [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r4:00000000 r5:84be038c r4:84be0000 r4:84bbbe80 r4:00000001 dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:83:3726 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:83 state:D stack:0 pid:3726 tgid:3726 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e04e9d84 r8:00000002 r7:60000113 r6:e04e9d8c r5:84991800 r4:84991800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84991800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04e9e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba3280 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84991800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfcf7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ac7f8c r4:84ac7c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ac7f8c r4:84bc4b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84991800 r8:84bc4bac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84bc4b80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bc4b80 r8:80287e08 r7:e04a5e60 r6:84bc4c00 r5:84991800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 INFO: task kworker/0:83:3726 is blocked on a mutex likely owned by task kworker/1:201:3654. r5:80000113 r4:80239bb0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r5:00001000 r4:dfb45000 r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04f5e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba35c0 r5:844c738c r4:844c7000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:84bc4c80 5fa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba3300 INFO: task kworker/0:84:3729 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: c29e6000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:85:3730 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:85 state:D stack:0 pid:3730 tgid:3730 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0649d84 r8:00000002 r7:60000013 r6:e0649d8c r5:84993000 r4:84993000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84993000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0649e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba3740 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84993000 r7:00000000 r6:83018000 r5:00001000 r4:7f087000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe73000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ad438c r4:84ad4000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ad438c r4:84bc4d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84993000 r8:84bc4dac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84bc4d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bc4d80 r8:80287e08 r7:e04f5e60 r6:84bc4e00 r5:84993000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0649fb0 to 0xe0649ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba3440 INFO: task kworker/0:85:3730 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: c29e6000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:86:3731 blocked for more than 452 seconds. task:kworker/0:86 state:D stack:0 pid:3731 tgid:3731 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0651e08 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:84ad478c r4:84ad4400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84994800 r8:84bc4eac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 dd60: 80230ad0 80239bb0 80000113 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:87:3733 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:87 state:D stack:0 pid:3733 tgid:3733 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0655d84 r8:00000002 r7:60000113 r6:e0655d8c r5:8436ec00 r4:8436ec00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8436ec00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0655e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba3b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8436ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f08b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfec5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ad4b8c r4:84ad4800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ad4b8c r4:84bc4f80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8436ec00 r8:84bc4fac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84bc4f80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bc4f80 r8:80287e08 r7:e0651e60 r6:84bc9500 r5:8436ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0655fb0 to 0xe0655ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba3880 INFO: task kworker/0:87:3733 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: c3510000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r9:83018005 r8:8436c800 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 r5:84ad4f8c r4:84ad4c00 r10:61c88647 r9:8436c800 r8:84b2402c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: c3510000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:89:3738 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:89 state:D stack:0 pid:3738 tgid:3738 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0665d84 r8:00000002 r7:60000113 r6:e0665d8c r5:84370c00 r4:84370c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84370c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0665e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba3ec0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84370c00 r7:00000000 r6:83018000 r5:00001000 r4:7f091000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff23000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ad578c r4:84ad5400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ad578c r4:84b24080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xe058dd28 to 0xe058dd70) r4:82ac21e4 r4:e058ddc0 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84bbbe80 r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:84ba8680 Workqueue: events bpf_prog_free_deferred [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba3e00 r5:84ad538c r4:84ad5000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:84b24100 r8:80287e08 r7:e0665e60 r6:84b24180 r5:84993c00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba3d80 INFO: task kworker/0:90:3740 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: c3510000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:91:3742 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:91 state:D stack:0 pid:3742 tgid:3742 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0661d84 r8:00000002 r7:60000113 r6:e0661d8c r5:84996000 r4:84996000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84996000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0661e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba3700 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84996000 r7:00000000 r6:83018000 r5:00001000 r4:7f093000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:84ad5b8c r4:84ad5800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/0:91:3742 is blocked on a mutex likely owned by task kworker/1:201:3654. dd60: 80230ad0 80239bb0 80000113 ffffffff r4:e058ddc0 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:92:3743 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:92 state:D stack:0 pid:3743 tgid:3743 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e065dd84 r8:00000002 r7:60000113 r6:e065dd8c r5:84996c00 r4:84996c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84996c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e065de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b7e040 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84996c00 r7:00000000 r6:83018000 r5:00001000 r4:7f095000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff69000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ad5f8c r4:84ad5c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ad5f8c r4:84b24300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84996c00 r8:84b2432c r7:82804d40 r6:dddced80 r5:dddceda0 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r4:e058ddc0 r5:00001000 r4:dfb45000 r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r4:84995400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84995400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e066de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b7e700 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84995400 r7:00000000 r6:83018000 r5:00001000 r4:7f09b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffbd000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ad6b8c r4:84ad6800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ad6b8c r4:84b24400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84995400 r8:84b2442c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b24400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b24400 r8:80287e08 r7:e065de60 r6:84b24480 r5:84995400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe066dfb0 to 0xe066dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b7e080 INFO: task kworker/0:93:3746 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: c4446000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:94:3748 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:94 state:D stack:0 pid:3748 tgid:3748 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r4:84b98c00 r4:00000000 r5:00001000 r4:dff83000 r5:84ad638c r4:84ad6000 r10:61c88647 r9:84b98c00 r8:84b2452c r7:82804d40 r6:dddced80 r5:dddceda0 Workqueue: events bpf_prog_free_deferred r5:80000113 r4:80239bb0 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) Exception stack(0xe058dfb0 to 0xe058dff8) task:kworker/0:95 state:D stack:0 pid:3749 tgid:3749 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:84ad678c r4:84ad6400 r10:61c88647 r9:84b99800 r8:84b2462c r7:82804d40 r6:dddced80 r5:dddceda0 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0679fb0 to 0xe0679ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b7e180 INFO: task kworker/0:95:3749 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: c4767000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r5:84b9a400 r4:8291a680 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b7e840 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84b9a400 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ad6f8c r4:84ad6c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ad6f8c r4:84b24700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b9a400 r8:84b2472c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b24700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b24700 r8:80287e08 r7:e066de60 r6:84b24780 r5:84b9a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0675fb0 to 0xe0675ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:82ac21e4 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) Exception stack(0xe058dfb0 to 0xe058dff8) r10:8291a684 r9:e0681d84 r8:00000002 r7:60000113 r6:e0681d8c r5:84b9b000 r9:83018005 r8:84b9b000 r7:00000000 r6:83018000 r5:00001000 r4:7f09f000 r10:61c88647 r9:84b9b000 r8:84b2482c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b7e780 INFO: task kworker/0:97:3754 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: c499c000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:84b9bc00 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:84ad778c r4:84ad7400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:99:3758 blocked for more than 453 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:99 state:D stack:0 pid:3758 tgid:3758 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0689d84 r8:00000002 r7:60000013 r6:e0689d8c r5:84b9c800 r4:84b9c800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r4:00000000 r5:00001000 r4:e0457000 r5:84ad7b8c r4:84ad7800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 dd60: 80230ad0 80239bb0 80000113 ffffffff r4:00000000 r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84ba8680 r10:8291a684 r9:e0699d84 r8:00000002 r7:60000113 r6:e0699d8c r5:84373000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84373000 r8:84b24b2c r7:82804d40 r6:dddced80 r5:dddceda0 INFO: task kworker/0:100:3761 is blocked on a mutex likely owned by task kworker/1:201:3654. r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:101:3762 blocked for more than 453 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:101 state:D stack:0 pid:3762 tgid:3762 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e069dd84 r8:00000002 r7:60000013 r6:e069dd8c r5:84373c00 r4:84373c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84373c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:84373c00 r8:84b24bac r7:82804d40 r6:dddced80 r5:dddceda0 Workqueue: events bpf_prog_free_deferred r5:80000113 r4:80239bb0 r5:00001000 r4:dfb45000 r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 Workqueue: events bpf_prog_free_deferred [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b7ec80 INFO: task kworker/0:102:3764 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: c578e000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 dfa0: 00000000 00000000 00000000 00000000 r5:84370000 r4:8291a680 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8479f4c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84370000 r7:00000000 r6:83018000 r5:00001000 r4:7f0cd000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0765000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ae4b8c r4:84ae4800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ae4b8c r4:84b24c80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84370000 r8:84b24cac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b24c80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b24c80 r8:80287e08 r7:e06a5e60 r6:84bc9800 r5:84370000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b1fb0 to 0xe06b1ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r5:80000113 r4:80239bb0 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) dfa0: 00000000 00000000 00000000 00000000 r5:84371800 r4:8291a680 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84441040 r5:84ae0b8c r4:84ae0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84371800 r8:84b24d2c r7:82804d40 r6:dddced80 r5:dddceda0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:105:3770 blocked for more than 453 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r4:84376c00 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:84ae0f8c r4:84ae0c00 r10:61c88647 r9:84376c00 r8:84b24dac r7:82804d40 r6:dddced80 r5:dddceda0 INFO: task kworker/0:105:3770 is blocked on a mutex likely owned by task kworker/1:201:3654. [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 Workqueue: events bpf_prog_free_deferred r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:84b24e00 r8:80287e08 r7:e06b1e60 r6:84bc9980 r5:84372400 Call trace: r5:80000113 r4:80239bb0 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e06c9d84 r8:00000002 r7:60000013 r6:e06c9d8c r5:8436b000 r4:8436b000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8436b000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06c9e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844415c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8436b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0b1000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e04f1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ae178c r4:84ae1400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ae178c r4:84b24e80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8436b000 r8:84b24eac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b24e80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b24e80 r8:80287e08 r7:e06b1e60 r6:84bc9a00 r5:8436b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84441280 INFO: task kworker/0:107:3773 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: c63fa000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd60: 80230ad0 80239bb0 80000113 ffffffff [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) dfa0: 00000000 00000000 00000000 00000000 [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:84ae1b8c r4:84ae1800 r10:61c88647 r9:84375400 r8:84b24f2c r7:82804d40 r6:dddced80 r5:dddceda0 INFO: task kworker/0:108:3775 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: c63fa000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 Workqueue: events bpf_prog_free_deferred [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:84ae1f8c r4:84ae1c00 r10:61c88647 r9:85058c00 r8:84b24fac r7:82804d40 r6:dddced80 r5:dddceda0 task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: c69d7000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:110:3779 blocked for more than 453 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:110 state:D stack:0 pid:3779 tgid:3779 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e06e1d84 r8:00000002 r7:60000113 r6:e06e1d8c r5:8505a400 r4:8505a400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8505a400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06e1e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:84ae238c r4:84ae2000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Exception stack(0xe058dd28 to 0xe058dd70) dd60: 80230ad0 80239bb0 80000113 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:00000000 r5:00001000 r4:dfb45000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/0:111:3781 blocked for more than 453 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:111 state:D stack:0 pid:3781 tgid:3781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e06e9d84 r8:00000002 r7:60000113 r6:e06e9d8c r5:85059800 r4:85059800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85059800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06e9e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84441b00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85059800 r7:00000000 r6:83018000 r5:00001000 r4:7f0b9000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e054b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ae278c r4:84ae2400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ae278c r4:84877080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85059800 r8:848770ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84877080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84877080 r8:80287e08 r7:e06b1e60 r6:84bc9c00 r5:85059800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06e9fb0 to 0xe06e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:844416c0 INFO: task kworker/0:111:3781 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: c6c74000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:112:3783 blocked for more than 453 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:112 state:D stack:0 pid:3783 tgid:3783 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e06f1d84 r8:00000002 r7:60000113 r6:e06f1d8c r5:8505bc00 r4:8505bc00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8505bc00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06f1e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84441c00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8505bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f0bb000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0585000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ae2b8c r4:84ae2800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ae2b8c r4:84877100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8505bc00 r8:8487712c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84877100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84877100 r8:80287e08 r7:e06b1e60 r6:84bc9c80 r5:8505bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06f1fb0 to 0xe06f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84441900 INFO: task kworker/0:112:3783 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: c6c74000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:113:3786 blocked for more than 453 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:113 state:D stack:0 pid:3786 tgid:3786 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e06fdd84 r8:00000002 r7:60000013 r6:e06fdd8c r5:85058000 r4:85058000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85058000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06fde08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84441d40 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85058000 r7:00000000 r6:83018000 r5:00001000 r4:7f0bd000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e059d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ae2f8c r4:84ae2c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ae2f8c r4:84877180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85058000 r8:848771ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84877180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84877180 r8:80287e08 r7:e06b1e60 r6:84bc9d00 r5:85058000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06fdfb0 to 0xe06fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84441a00 INFO: task kworker/0:113:3786 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: c70c3000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:114:3787 blocked for more than 453 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:114 state:D stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0701d84 r8:00000002 r7:60000013 r6:e0701d8c r5:8505d400 r4:8505d400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8505d400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0701e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84441e80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8505d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0bf000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05b9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ae338c r4:84ae3000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ae338c r4:84877200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8505d400 r8:8487722c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84877200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84877200 r8:80287e08 r7:e06b1e60 r6:84bc9d80 r5:8505d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0701fb0 to 0xe0701ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84441bc0 INFO: task kworker/0:114:3787 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: c745a000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:115:3789 blocked for more than 453 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:115 state:D stack:0 pid:3789 tgid:3789 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e070dd84 r8:00000002 r7:60000013 r6:e070dd8c r5:8505c800 r4:8505c800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8505c800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e070de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84441fc0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8505c800 r7:00000000 r6:83018000 r5:00001000 r4:7f0c1000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05ed000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ae378c r4:84ae3400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ae378c r4:84877280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8505c800 r8:848772ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84877280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84877280 r8:80287e08 r7:e06b1e60 r6:84bc9e00 r5:8505c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe070dfb0 to 0xe070dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84441d00 INFO: task kworker/0:115:3789 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: c745a000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:116:3791 blocked for more than 453 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:116 state:D stack:0 pid:3791 tgid:3791 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0721d84 r8:00000002 r7:60000013 r6:e0721d8c r5:8505e000 r4:8505e000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8505e000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0721e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba9600 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8505e000 r7:00000000 r6:83018000 r5:00001000 r4:7f0c3000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0711000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ae3b8c r4:84ae3800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ae3b8c r4:84877300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8505e000 r8:8487732c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84877300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84877300 r8:80287e08 r7:e06b1e60 r6:84bc9e80 r5:8505e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba9a80 INFO: task kworker/0:116:3791 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: c7946000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:117:3794 blocked for more than 453 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:117 state:D stack:0 pid:3794 tgid:3794 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0735d84 r8:00000002 r7:60000113 r6:e0735d8c r5:8505b000 r4:8505b000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8505b000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0735e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84441e00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8505b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0c5000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e071d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ae3f8c r4:84ae3c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ae3f8c r4:84877380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8505b000 r8:848773ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84877380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84877380 r8:80287e08 r7:e06b1e60 r6:84bc9f00 r5:8505b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0735fb0 to 0xe0735ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba9f40 INFO: task kworker/0:117:3794 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: c7b45000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:118:3796 blocked for more than 453 seconds. Not tainted 6.15.0-rc7-syzkaller #0 task:kworker/0:118 state:D stack:0 pid:3796 tgid:3796 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e074dd84 r8:00000002 r7:60000113 r6:e074dd8c r5:85060c00 r4:85060c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85060c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e074de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8479f040 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85060c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0c7000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e072d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ae438c r4:84ae4000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ae438c r4:84877400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85060c00 r8:8487742c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84877400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84877400 r8:80287e08 r7:e06b1e60 r6:84bc9f80 r5:85060c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe074dfb0 to 0xe074dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8479f000 INFO: task kworker/0:118:3796 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: c7b45000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:119:3797 blocked for more than 453 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:119 state:D stack:0 pid:3797 tgid:3797 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0755d84 r8:00000002 r7:60000113 r6:e0755d8c r5:85061800 r4:85061800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85061800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0755e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8479f340 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85061800 r7:00000000 r6:83018000 r5:00001000 r4:7f0c9000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e073d000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ae478c r4:84ae4400 r10:61c88647 r9:85061800 r8:848774ac r7:82804d40 r6:dddced80 r5:dddceda0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: dd20: c7e2e000 dfadb000 00000001 80239b98 7f2f7000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:120:3801 blocked for more than 453 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:120 state:D stack:0 pid:3801 tgid:3801 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e068dd84 r8:00000002 r7:60000013 r6:e068dd8c r5:85062400 r4:85062400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85062400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e068de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8479f600 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85062400 r7:00000000 r6:83018000 r5:00001000 r4:7f015000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df97f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ae4f8c r4:84ae4c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ae4f8c r4:84877500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85062400 r8:8487752c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84877500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84877500 r8:80287e08 r7:e06b1e60 r6:847a7080 r5:85062400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe068dfb0 to 0xe068dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8479f2c0 INFO: task kworker/0:120:3801 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: c7e4c000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 Exception stack(0xe058dfb0 to 0xe058dff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Not tainted 6.15.0-rc7-syzkaller #0 Workqueue: events bpf_prog_free_deferred r5:85063000 r4:8291a680 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0779e08 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e043b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84bea78c r4:84bea400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84bea78c r4:847a7100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85063000 r8:847a712c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847a7100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a7100 r8:80287e08 r7:e0441e60 r6:847a7180 r5:85063000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0779fb0 to 0xe0779ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:843e2f40 INFO: task kworker/1:225:3802 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: c7e4c000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:121:3804 blocked for more than 453 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:121 state:D stack:0 pid:3804 tgid:3804 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb01d84 r8:00000002 r7:60000013 r6:dfb01d8c r5:85063c00 r4:85063c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85063c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb01e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8479f740 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85063c00 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9b1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ae538c r4:84ae5000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ae538c r4:84877580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85063c00 r8:848775ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84877580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84877580 r8:80287e08 r7:e068de60 r6:847a7200 r5:85063c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb01fb0 to 0xdfb01ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Call trace: dd60: 80230ad0 80239bb0 80000113 ffffffff [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:122:3806 blocked for more than 453 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:122 state:D stack:0 pid:3806 tgid:3806 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e00d9d84 r8:00000002 r7:60000013 r6:e00d9d8c r5:85064800 r4:85064800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85064800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e00d9e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8479f9c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85064800 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa19000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ae5b8c r4:84ae5800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ae5b8c r4:84877600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85064800 r8:8487762c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84877600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84877600 r8:80287e08 r7:dfb01e60 r6:847a7280 r5:85064800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00d9fb0 to 0xe00d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8479f400 INFO: task kworker/0:122:3806 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: c83d6000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 Exception stack(0xe058dfb0 to 0xe058dff8) r4:84ba8680 Workqueue: events bpf_prog_free_deferred [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0785e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8479f8c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85065400 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9cd000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ae578c r4:84ae5400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ae578c r4:84877680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85065400 r8:848776ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84877680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84877680 r8:80287e08 r7:e00d9e60 r6:847a7300 r5:85065400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0785fb0 to 0xe0785ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8479f680 INFO: task kworker/0:123:3807 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: c86a6000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84bbbe80 Exception stack(0xe058dfb0 to 0xe058dff8) r4:84ba8680 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:84ae5f8c r4:84ae5c00 r7:dddced80 r6:83018000 r5:84ae5f8c r4:84877700 r10:00000000 r9:84877700 r8:80287e08 r7:e00d9e60 r6:847a7780 r5:85066000 INFO: task kworker/0:124:3809 is blocked on a mutex likely owned by task kworker/1:201:3654. dd60: 80230ad0 80239bb0 80000113 ffffffff r4:e058ddc0 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b9e000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0741e08 r9:83018005 r8:84b9e000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa83000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ae638c r4:84ae6000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ae638c r4:84877780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b9e000 r8:848777ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84877780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84877780 r8:80287e08 r7:e0789e60 r6:84877800 r5:84b9e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0741fb0 to 0xe0741ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8479f680 INFO: task kworker/0:125:3812 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: c8ab0000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:126:3814 blocked for more than 453 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:126 state:D stack:0 pid:3814 tgid:3814 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e078dd84 r8:00000002 r7:60000113 r6:e078dd8c r5:84b9ec00 r4:84b9ec00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b9ec00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e078de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8479f280 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84b9ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f037000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb6b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ae6f8c r4:84ae6c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ae6f8c r4:84877880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b9ec00 r8:848778ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84877880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84877880 r8:80287e08 r7:e0741e60 r6:84877900 r5:84b9ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe078dfb0 to 0xe078dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8479fc80 INFO: task kworker/0:126:3814 is blocked on a mutex likely owned by task kworker/1:201:3654. Workqueue: events bpf_prog_free_deferred dd60: 80230ad0 80239bb0 80000113 ffffffff r4:e058ddc0 r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b9d400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b9d400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0791e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8479fd40 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84b9d400 r7:00000000 r6:83018000 r5:00001000 r4:7f033000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ae678c r4:84ae6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ae678c r4:84877980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b9d400 r8:848779ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84877980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84877980 r8:80287e08 r7:e078de60 r6:84877a00 r5:84b9d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0791fb0 to 0xe0791ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8479fbc0 INFO: task kworker/0:127:3816 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: c8de7000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84bbbe80 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84b98000 r7:00000000 r6:83018000 r5:00001000 r4:7f035000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfafd000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ae6b8c r4:84ae6800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ae6b8c r4:84877a80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b98000 r8:84877aac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84877a80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84877a80 r8:80287e08 r7:e078de60 r6:84877b00 r5:84b98000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0795fb0 to 0xe0795ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8479fd80 INFO: task kworker/0:128:3818 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: c8de7000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e07ade08 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd4b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ae738c r4:84ae7000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ae738c r4:84877b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:843f8000 r8:84877bac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84877b80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84877b80 r8:80287e08 r7:e078de60 r6:84877c00 r5:843f8000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07adfb0 to 0xe07adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847bc040 INFO: task kworker/0:129:3820 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: c93af000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:84bbbe80 Exception stack(0xe058dfb0 to 0xe058dff8) INFO: task kworker/0:130:3822 blocked for more than 453 seconds. r4:843f8c00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e07b1e08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:843f8c00 r8:84877cac r7:82804d40 r6:dddced80 r5:dddceda0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 dd60: 80230ad0 80239bb0 80000113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:dfd83000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:132:3826 blocked for more than 453 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:132 state:D stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e07bdd84 r8:00000002 r7:60000113 r6:e07bdd8c r5:843fa400 r4:843fa400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:843fa400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e07bde08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847bc640 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:843fa400 r7:00000000 r6:83018000 r5:00001000 r4:7f041000 r5:00001000 r4:dfdb7000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:843fa400 r8:84877eac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r5:84be038c r4:84be0000 r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 INFO: task kworker/0:133:3828 blocked for more than 453 seconds. r5:843fb000 r4:8291a680 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ae7f8c r4:84ae7c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ae7f8c r4:84877f80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:843fb000 r8:84877fac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84877f80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84877f80 r8:80287e08 r7:e07bde60 r6:847c0000 r5:843fb000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07d1fb0 to 0xe07d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847bc540 INFO: task kworker/0:133:3828 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: c9c31000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:134:3830 blocked for more than 453 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:134 state:D stack:0 pid:3830 tgid:3830 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8509078c r4:85090400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8509078c r4:847c0080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:843fbc00 r8:847c00ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:847c0080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847c0080 r8:80287e08 r7:e07bde60 r6:847c0100 r5:843fbc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07d5fb0 to 0xe07d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred dd60: 80230ad0 80239bb0 80000113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/0:135 state:D stack:0 pid:3832 tgid:3832 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:e058ddc0 r5:00001000 r4:dfb45000 r4:84bbbe80 Exception stack(0xe058dfb0 to 0xe058dff8) r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:136:3833 blocked for more than 453 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:136 state:D stack:0 pid:3833 tgid:3833 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e067dd84 r8:00000002 r7:60000113 r6:e067dd8c r5:843fd400 r4:843fd400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:843fd400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e067de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847bcb00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:843fd400 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdfb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85090b8c r4:85090800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85090b8c r4:847c0280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:843fd400 r8:847c02ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:847c0280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847c0280 r8:80287e08 r7:e07d9e60 r6:847c0300 r5:843fd400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe067dfb0 to 0xe067dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847bca00 INFO: task kworker/0:136:3833 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: ca0ed000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xe058dfb0 to 0xe058dff8) INFO: task kworker/0:137:3836 blocked for more than 453 seconds. [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847bcf00 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84376000 r8:847c03ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:847c0380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847c0380 r8:80287e08 r7:e07d9e60 r6:847a7800 r5:84376000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e9fb0 to 0xe07e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847bcb40 INFO: task kworker/0:137:3836 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: ca7b6000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:dfb45000 r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xe058dfb0 to 0xe058dff8) Not tainted 6.15.0-rc7-syzkaller #0 r4:85066c00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e07f1e08 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:847c0400 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:8291a684 r9:e07f5d84 r8:00000002 r7:60000013 r6:e07f5d8c r5:8505ec00 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:847c0480 Exception stack(0xe07f5fb0 to 0xe07f5ff8) task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:140:3841 blocked for more than 453 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:140 state:D stack:0 pid:3841 tgid:3841 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e07f9d84 r8:00000002 r7:60000013 r6:e07f9d8c r5:85068000 r4:85068000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85068000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e07f9e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847d6040 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85068000 r7:00000000 r6:83018000 r5:00001000 r4:7f04d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff89000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85091b8c r4:85091800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85091b8c r4:847c0500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85068000 r8:847c052c r7:82804d40 r6:dddced80 r5:dddceda0 r4:847c0500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847c0500 r8:80287e08 r7:e07f5e60 r6:847a7980 r5:85068000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07f9fb0 to 0xe07f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847bcd80 INFO: task kworker/0:140:3841 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) Exception stack(0xe058dd28 to 0xe058dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/0:141:3843 blocked for more than 453 seconds. r5:843fec00 r4:8291a680 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847d6280 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85091f8c r4:85091c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85091f8c r4:847c0580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:843fec00 r8:847c05ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:847c0580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847c0580 r8:80287e08 r7:e07f5e60 r6:847c0600 r5:843fec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d61c0 INFO: task kworker/0:141:3843 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: cad03000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:e008d000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:e00b1000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:85092b8c r4:847c0780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85060000 r8:847c07ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:847c0780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847c0780 r8:80287e08 r7:e4805e60 r6:847c0800 r5:85060000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe4809fb0 to 0xe4809ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d63c0 INFO: task kworker/0:143:3848 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: cb3ac000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:144:3849 blocked for more than 453 seconds. Not tainted 6.15.0-rc7-syzkaller #0 [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847d68c0 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 r4:847d63c0 r4:00000000 dd60: 80230ad0 80239bb0 80000113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:847c0980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847c0980 r8:80287e08 r7:e4831e60 r6:847c0a00 r5:84878c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe4835fb0 to 0xe4835ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d6740 INFO: task kworker/0:145:3852 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: cb657000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e4839e08 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:847c0a80 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85093b8c r4:85093800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85093b8c r4:847c0b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8487a400 r8:847c0bac r7:82804d40 r6:dddced80 r5:dddceda0 r4:847c0b80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847c0b80 r8:80287e08 r7:e4839e60 r6:847c0c00 r5:8487a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe483dfb0 to 0xe483dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d6940 INFO: task kworker/0:147:3856 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: cbe4d000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:84ba8680 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e4845e08 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8509c38c r4:8509c000 r4:847c0c80 Exception stack(0xe4845fb0 to 0xe4845ff8) Workqueue: events bpf_prog_free_deferred dd60: 80230ad0 80239bb0 80000113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/0:149:3859 blocked for more than 454 seconds. r5:8506a400 r4:8291a680 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: cc196000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:226:3862 blocked for more than 454 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:226 state:D stack:0 pid:3862 tgid:3862 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e4841d84 r8:00000002 r7:60000013 r6:e4841d8c r5:8506b000 r4:8506b000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8506b000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e4841e08 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84beaf8c r4:84beac00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 dd60: 80230ad0 80239bb0 80000113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 Exception stack(0xe058dfb0 to 0xe058dff8) INFO: task kworker/0:150:3865 blocked for more than 454 seconds. r5:8506d400 r4:8291a680 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:847c0d80 r8:80287e08 r7:e4845e60 r6:847a7c00 r5:8506d400 task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:151:3867 blocked for more than 454 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:151 state:D stack:0 pid:3867 tgid:3867 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e4865d84 r8:00000002 r7:60000113 r6:e4865d8c r5:8506c800 r4:8506c800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8506c800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e4865e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847e2480 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8506c800 r7:00000000 r6:83018000 r5:00001000 r4:7f06d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e8881000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8509d38c r4:8509d000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8509d38c r4:847c0e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8506c800 r8:847c0e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:847c0e00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847c0e00 r8:80287e08 r7:e485de60 r6:847a7c80 r5:8506c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe4865fb0 to 0xe4865ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847e2080 INFO: task kworker/0:151:3867 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 dd60: 80230ad0 80239bb0 80000113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 Exception stack(0xe058dfb0 to 0xe058dff8) INFO: task kworker/0:152:3869 blocked for more than 454 seconds. [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:847e2080 r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:82ac21e4 r4:00000000 r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:153:3870 blocked for more than 454 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:153 state:D stack:0 pid:3870 tgid:3870 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e4879d84 r8:00000002 r7:60000113 r6:e4879d8c r5:8506bc00 r4:8506bc00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8506bc00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e4879e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847e2300 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8506bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f06b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e486f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8509cf8c r4:8509cc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8509cf8c r4:847c0f00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:847e2240 r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xe058dfb0 to 0xe058dff8) Not tainted 6.15.0-rc7-syzkaller #0 r5:8506e000 r4:8291a680 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:847c0f80 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 r5:80000113 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:155:3877 blocked for more than 454 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:155 state:D stack:0 pid:3877 tgid:3877 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e4849d84 r8:00000002 r7:60000113 r6:e4849d8c r5:85069800 r4:85069800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85069800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e4849e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847e27c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85069800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc05000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8509db8c r4:8509d800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8509db8c r4:847eb000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85069800 r8:847eb02c r7:82804d40 r6:dddced80 r5:dddceda0 r4:847eb000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847eb000 r8:80287e08 r7:e000de60 r6:847a7e80 r5:85069800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe4849fb0 to 0xe4849ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847e2500 INFO: task kworker/0:155:3877 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: cd463000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:847eb080 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: dd20: cda97000 dfadb000 00000001 80239b98 7f2f7000 00000001 r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:157:3881 blocked for more than 454 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:157 state:D stack:0 pid:3881 tgid:3881 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e06cdd84 r8:00000002 r7:60000013 r6:e06cdd8c r5:85072400 r4:85072400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85072400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06cde08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847e2a40 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:dfcb1000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:85072400 r8:847eb12c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:e058ddc0 r5:00001000 r4:dfb45000 r4:84bbbe80 Exception stack(0xe058dfb0 to 0xe058dff8) Not tainted 6.15.0-rc7-syzkaller #0 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:85073000 r8:847a762c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xe058dd28 to 0xe058dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:158:3884 blocked for more than 454 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:158 state:D stack:0 pid:3884 tgid:3884 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0705d84 r8:00000002 r7:60000113 r6:e0705d8c r5:85073c00 r4:85073c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85073c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0705e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847e2b40 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85073c00 r7:00000000 r6:83018000 r5:00001000 r4:7f079000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd01000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8509e78c r4:8509e400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8509e78c r4:847eb180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85073c00 r8:847eb1ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:847eb180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847eb180 r8:80287e08 r7:e06cde60 r6:847a7700 r5:85073c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0705fb0 to 0xe0705ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847e2840 INFO: task kworker/0:158:3884 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r5:80000113 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8509eb8c r4:8509e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8509eb8c r4:847eb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85074800 r8:847eb22c r7:82804d40 r6:dddced80 r5:dddceda0 r4:847eb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847eb200 r8:80287e08 r7:e0705e60 r6:847a7380 r5:85074800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0715fb0 to 0xe0715ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847e2840 INFO: task kworker/0:159:3885 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: ce701000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-rc7-syzkaller #0 r4:85075400 r4:00000000 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8509f38c r4:8509f000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 INFO: task kworker/0:161:3889 blocked for more than 454 seconds. r10:8291a684 r9:e8895d84 r8:00000002 r7:60000113 r6:e8895d8c r5:85070c00 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:8291a684 r9:e88a5d84 r8:00000002 r7:60000013 r6:e88a5d8c r5:85070000 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:00001000 r4:dfef9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8509fb8c r4:8509f800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8509fb8c r4:847eb380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85070000 r8:847eb3ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:847eb380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847eb380 r8:80287e08 r7:e888de60 r6:847a7500 r5:85070000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe88a5fb0 to 0xe88a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847e2e80 INFO: task kworker/0:162:3891 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: cee5a000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:dfed1000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:847eb400 r8:80287e08 r7:e88a5e60 r6:847eb480 r5:8487bc00 task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r5:00001000 r4:dfb45000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:164:3896 blocked for more than 454 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:164 state:D stack:0 pid:3896 tgid:3896 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e88a9d84 r8:00000002 r7:60000013 r6:e88a9d8c r5:8487d400 r4:8487d400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8487d400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e88a9e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847f97c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8487d400 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffc7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:850a0f8c r4:850a0c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850a0f8c r4:847eb500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8487d400 r8:847eb52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:847eb500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847eb500 r8:80287e08 r7:e88a5e60 r6:847eb580 r5:8487d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe88a9fb0 to 0xe88a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:80000113 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847f90c0 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8487e000 r8:847eb62c r7:82804d40 r6:dddced80 r5:dddceda0 r4:847eb600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847eb600 r8:80287e08 r7:e88a9e60 r6:847eb680 r5:8487e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe487dfb0 to 0xe487dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847e3440 INFO: task kworker/0:165:3897 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: cf912000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xe058dfb0 to 0xe058dff8) Not tainted 6.15.0-rc7-syzkaller #0 r4:8487ec00 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847f9300 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:82ac21e4 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r4:84bbbe80 Exception stack(0xe058dfb0 to 0xe058dff8) Not tainted 6.15.0-rc7-syzkaller #0 r4:8487b000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e88b5e08 r5:00001000 r4:dff81000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:847eb800 Exception stack(0xe88b5fb0 to 0xe88b5ff8) task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:168:3904 blocked for more than 454 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:168 state:D stack:0 pid:3904 tgid:3904 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e88b9d84 r8:00000002 r7:60000113 r6:e88b9d8c r5:84908000 r4:84908000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84908000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e88b9e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847f9680 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84908000 r7:00000000 r6:83018000 r5:00001000 r4:7f08b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff9d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:850a0b8c r4:850a0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850a0b8c r4:847eb900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84908000 r8:847eb92c r7:82804d40 r6:dddced80 r5:dddceda0 r4:847eb900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847eb900 r8:80287e08 r7:e88a9e60 r6:847eb980 r5:84908000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe88b9fb0 to 0xe88b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847f9380 INFO: task kworker/0:168:3904 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8291a684 r9:e88bdd84 r8:00000002 r7:60000113 r6:e88bdd8c r5:84908c00 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:84908c00 r8:847eba2c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 r5:80000113 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:170:3908 blocked for more than 454 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:170 state:D stack:0 pid:3908 tgid:3908 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e88c1d84 r8:00000002 r7:60000113 r6:e88c1d8c r5:84909800 r4:84909800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84909800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e88c1e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847f9ac0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84909800 r7:00000000 r6:83018000 r5:00001000 r4:7f091000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:850a178c r4:850a1400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850a178c r4:847ebb00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84909800 r8:847ebb2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:847ebb00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847ebb00 r8:80287e08 r7:e88bde60 r6:847ebb80 r5:84909800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe88c1fb0 to 0xe88c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:84bbbe80 Exception stack(0xe058dfb0 to 0xe058dff8) Not tainted 6.15.0-rc7-syzkaller #0 r4:8490a400 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e88c5e08 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xe88c5fb0 to 0xe88c5ff8) Workqueue: events bpf_prog_free_deferred dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:172:3912 blocked for more than 454 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:172 state:D stack:0 pid:3912 tgid:3912 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:847ebd00 r8:80287e08 r7:e88c5e60 r6:847ebd80 r5:8490b000 task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: d09a2000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 Exception stack(0xe058dfb0 to 0xe058dff8) Not tainted 6.15.0-rc7-syzkaller #0 r4:8490bc00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e88cde08 r5:00001000 r4:e04bd000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/0:174:3916 blocked for more than 454 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:174 state:D stack:0 pid:3916 tgid:3916 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e88d5d84 r8:00000002 r7:60000013 r6:e88d5d8c r5:8490d400 r4:8490d400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8490d400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e88d5e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847f9f00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8490d400 r7:00000000 r6:83018000 r5:00001000 r4:7f097000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0487000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:850a238c r4:850a2000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850a238c r4:847ebf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8490d400 r8:847ebf2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:847ebf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847ebf00 r8:80287e08 r7:e88cde60 r6:847ebf80 r5:8490d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe88d5fb0 to 0xe88d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847f9e00 INFO: task kworker/0:174:3916 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: d09a2000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: r5:85076c00 r4:8291a680 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:850a278c r4:850a2400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:84bbbe80 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:85076000 r7:00000000 r6:83018000 r5:00001000 r4:7f09f000 r5:850a2f8c r4:850a2c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850a2f8c r4:8480b080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85076000 r8:8480b0ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8480b080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8480b080 r8:80287e08 r7:e88cde60 r6:84816000 r5:85076000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe88e5fb0 to 0xe88e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8480d100 INFO: task kworker/0:176:3920 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: d0e4f000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 INFO: task kworker/1:228:3922 blocked for more than 454 seconds. r5:85078000 r4:8291a680 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84837840 r5:84bebf8c r4:84bebc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:84816080 r8:80287e08 r7:e0441e60 r6:84816100 r5:85078000 task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: r5:85078c00 r4:8291a680 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:8480b100 r8:80287e08 r7:e88e5e60 r6:84816180 r5:85078c00 task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:178:3925 blocked for more than 454 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:178 state:D stack:0 pid:3925 tgid:3925 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e88edd84 r8:00000002 r7:60000013 r6:e88edd8c r5:85079800 r4:85079800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85079800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e88ede08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8480d540 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85079800 r7:00000000 r6:83018000 r5:00001000 r4:7f0a1000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e052d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:850a338c r4:850a3000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850a338c r4:8480b200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xe058dd28 to 0xe058dd70) [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xe058dfb0 to 0xe058dff8) INFO: task kworker/0:179:3929 blocked for more than 454 seconds. task:kworker/0:179 state:D stack:0 pid:3929 tgid:3929 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e88d1d84 r8:00000002 r7:60000113 r6:e88d1d8c r5:8490e000 r4:8490e000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8490e000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e88d1e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8480d700 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8490e000 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e054d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:850a378c r4:850a3400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850a378c r4:8480b180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8490e000 r8:8480b1ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8480b180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8480b180 r8:80287e08 r7:e88e9e60 r6:8480b280 r5:8490e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe88d1fb0 to 0xe88d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8480d500 INFO: task kworker/0:179:3929 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e88f1e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8480d800 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8490ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a5000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0591000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:850a3b8c r4:850a3800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850a3b8c r4:8480b300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8490ec00 r8:8480b32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8480b300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8480b300 r8:80287e08 r7:e88e9e60 r6:8480b380 r5:8490ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe88f1fb0 to 0xe88f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8480d600 INFO: task kworker/0:180:3930 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 Exception stack(0xe058dd28 to 0xe058dd70) [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:84ba8680 Workqueue: events bpf_prog_free_deferred r5:8490c800 r4:8291a680 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:850a3f8c r4:850a3c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xe058dfb0 to 0xe058dff8) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:e069f000 r5:850a878c r4:850a8400 r10:61c88647 r9:8487c800 r8:8480b52c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xe058dd28 to 0xe058dd70) r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:183:3936 blocked for more than 454 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:183 state:D stack:0 pid:3936 tgid:3936 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ea909d84 r8:00000002 r7:60000013 r6:ea909d8c r5:84900c00 r4:84900c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84900c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea909e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8480de00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84900c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0ad000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e06b3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:850a8b8c r4:850a8800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850a8b8c r4:8480b600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84900c00 r8:8480b62c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8480b600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8480b600 r8:80287e08 r7:ea905e60 r6:8480b680 r5:84900c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea909fb0 to 0xea909ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8480da80 INFO: task kworker/0:183:3936 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe058dd28 to 0xe058dd70) [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 INFO: task kworker/0:184:3938 blocked for more than 454 seconds. r4:84901800 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e88d9e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847f9c00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84901800 r7:00000000 r6:83018000 r5:00001000 r4:7f0af000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e06d3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:850a8f8c r4:850a8c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850a8f8c r4:8480b700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84901800 r8:8480b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8480b700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8480b700 r8:80287e08 r7:ea909e60 r6:8480b780 r5:84901800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe88d9fb0 to 0xe88d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8480dc00 INFO: task kworker/0:184:3938 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: d24ac000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:185:3940 blocked for more than 454 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:185 state:D stack:0 pid:3940 tgid:3940 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ea90dd84 r8:00000002 r7:60000013 r6:ea90dd8c r5:84903000 r4:84903000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84903000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea90de08 r4:00000000 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:850a938c r4:850a9000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84903000 r8:8480b82c r7:82804d40 r6:dddced80 r5:dddceda0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8481d280 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84900000 r7:00000000 r6:83018000 r5:00001000 r4:7f0b3000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0707000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:850a978c r4:850a9400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850a978c r4:8480b900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84900000 r8:8480b92c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8480b900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8480b900 r8:80287e08 r7:ea90de60 r6:8480b980 r5:84900000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea91dfb0 to 0xea91dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8480df80 INFO: task kworker/0:186:3942 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: d2dea000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xe058dfb0 to 0xe058dff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:84903c00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea921e08 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:850a9b8c r4:850a9800 r10:61c88647 r9:84903c00 r8:8480ba2c r7:82804d40 r6:dddced80 r5:dddceda0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r10:8291a684 r9:ea925d84 r8:00000002 r7:60000113 r6:ea925d8c r5:84905400 r4:84905400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84905400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea925e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8481d700 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84905400 r7:00000000 r6:83018000 r5:00001000 r4:7f0b7000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e072b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:850a9f8c r4:850a9c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850a9f8c r4:8480bb00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84905400 r8:8480bb2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8480bb00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8480bb00 r8:80287e08 r7:ea921e60 r6:8480bb80 r5:84905400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea925fb0 to 0xea925ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8481d2c0 INFO: task kworker/0:188:3946 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: d32a4000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:84906000 r4:8291a680 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8481d880 r5:850aa38c r4:850aa000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:8480bc00 r8:80287e08 r7:ea925e60 r6:8480bc80 r5:84906000 r4:8481d580 Call trace: Exception stack(0xe058dd28 to 0xe058dd70) r4:82ac21e4 r4:e058ddc0 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:84902400 r4:8291a680 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84824040 r5:850ab78c r4:850ab400 r7:dddced80 r6:83018000 r5:850ab78c r4:8480bd00 r10:00000000 r9:8480bd00 r8:80287e08 r7:ea929e60 r6:8480bd80 r5:84902400 r4:8481d100 [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: d35d0000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:191:3952 blocked for more than 455 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:191 state:D stack:0 pid:3952 tgid:3952 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ea931d84 r8:00000002 r7:60000113 r6:ea931d8c r5:84904800 r4:84904800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84904800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea931e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8481da80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84904800 r7:00000000 r6:83018000 r5:00001000 r4:7f0bb000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0757000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:850aa78c r4:850aa400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850aa78c r4:8480be00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84904800 r8:8480be2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8480be00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8480be00 r8:80287e08 r7:ea919e60 r6:8480be80 r5:84904800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea931fb0 to 0xea931ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8481d100 INFO: task kworker/0:191:3952 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: d35d0000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xe058dfb0 to 0xe058dff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:84906c00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea935e08 r4:00000000 r5:850aab8c r4:850aa800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:8480bf00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea935fb0 to 0xea935ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8481d640 INFO: task kworker/0:192:3953 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: d39a7000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:193:3956 blocked for more than 455 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:193 state:D stack:0 pid:3956 tgid:3956 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ea92dd84 r8:00000002 r7:60000013 r6:ea92dd8c r5:85038000 r4:85038000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85038000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea92de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8481de40 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:850aaf8c r4:850aac00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85038000 r8:8480f02c r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xe058dd28 to 0xe058dd70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:84ba8680 Workqueue: events bpf_prog_free_deferred r4:85038c00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8885e08 r9:83018005 r8:85038c00 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 r5:850ab38c r4:850ab000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe058dd28 to 0xe058dd70) [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Call trace: r5:85039800 r4:8291a680 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:850abf8c r4:850abc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850abf8c r4:8480f200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85039800 r8:8480f22c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8480f200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8480f200 r8:80287e08 r7:ea919e60 r6:8480f280 r5:85039800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea939fb0 to 0xea939ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:848241c0 INFO: task kworker/0:195:3961 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: d3d99000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:196:3962 blocked for more than 455 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:196 state:D stack:0 pid:3962 tgid:3962 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e4875d84 r8:00000002 r7:60000013 r6:e4875d8c r5:8503a400 r4:8503a400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8503a400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e4875e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84824280 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8503a400 r7:00000000 r6:83018000 r5:00001000 r4:7f02f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa6b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:850abb8c r4:850ab800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850abb8c r4:8480f300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8503a400 r8:8480f32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8480f300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8480f300 r8:80287e08 r7:ea939e60 r6:8480f380 r5:8503a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe4875fb0 to 0xe4875ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84824100 INFO: task kworker/0:196:3962 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r4:00000000 dd60: 80230ad0 80239bb0 80000113 ffffffff r4:e058ddc0 r5:00001000 r4:dfb45000 r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:8503b000 [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:850b838c r4:850b8000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:8480f400 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84824300 INFO: task kworker/0:197:3964 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: d4371000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:198:3966 blocked for more than 455 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:198 state:D stack:0 pid:3966 tgid:3966 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8291a684 r9:ea941d84 r8:00000002 r7:60000113 r6:ea941d8c r5:8503c800 r4:00000000 r4:00000000 r5:850b8f8c r4:850b8c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xea941fb0 to 0xea941ff8) Workqueue: events bpf_prog_free_deferred Exception stack(0xe058dd28 to 0xe058dd70) r4:e058ddc0 r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 r4:84bbbe80 Exception stack(0xe058dfb0 to 0xe058dff8) task:kworker/0:199 state:D stack:0 pid:3968 tgid:3968 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:850b878c r4:850b8400 r4:8480f600 Exception stack(0xea949fb0 to 0xea949ff8) task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: d4cdb000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:200:3971 blocked for more than 455 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:200 state:D stack:0 pid:3971 tgid:3971 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ea951d84 r8:00000002 r7:60000113 r6:ea951d8c r5:8503d400 r4:8503d400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8503d400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea951e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84824ac0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8503d400 r7:00000000 r6:83018000 r5:00001000 r4:7f039000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd8f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:850b8b8c r4:850b8800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850b8b8c r4:8480f700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8503d400 r8:8480f72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8480f700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8480f700 r8:80287e08 r7:ea941e60 r6:8480f780 r5:8503d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea951fb0 to 0xea951ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84824b00 INFO: task kworker/0:200:3971 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 dd60: 80230ad0 80239bb0 80000113 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r5:00001000 r4:dfb45000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xe058dfb0 to 0xe058dff8) r4:84ba8680 task:kworker/0:201 state:D stack:0 pid:3973 tgid:3973 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea945e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84824d80 r5:850b938c r4:850b9000 r10:61c88647 r9:8503ec00 r8:8480f82c r7:82804d40 r6:dddced80 r5:dddceda0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: d504c000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:202:3976 blocked for more than 455 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:202 state:D stack:0 pid:3976 tgid:3976 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ea955d84 r8:00000002 r7:60000013 r6:ea955d8c r5:8503bc00 r4:8503bc00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8503bc00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:850b978c r4:850b9400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850b978c r4:8480f900 r10:61c88647 r9:8503bc00 r8:8480f92c r7:82804d40 r6:dddced80 r5:dddceda0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe058dd28 to 0xe058dd70) [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r5:84be038c r4:84be0000 r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:8291a684 r9:ea959d84 r8:00000002 r7:60000113 r6:ea959d8c r5:848a8000 [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea959e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84824740 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:848a8000 r7:00000000 r6:83018000 r5:00001000 r4:7f041000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe23000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:850b9b8c r4:850b9800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850b9b8c r4:8480fa00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848a8000 r8:8480fa2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8480fa00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8480fa00 r8:80287e08 r7:ea955e60 r6:8480fa80 r5:848a8000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea959fb0 to 0xea959ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84824d40 INFO: task kworker/0:203:3977 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: d5737000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 r5:00001000 r4:dfb45000 r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 r4:84bbbe80 Exception stack(0xe058dfb0 to 0xe058dff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:848a8c00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea965e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84833040 r5:00001000 r4:dfe4b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:850b9f8c r4:850b9c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850b9f8c r4:8480fb00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848a8c00 r8:8480fb2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8480fb00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8480fb00 r8:80287e08 r7:ea959e60 r6:8480fb80 r5:848a8c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea965fb0 to 0xea965ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84833000 INFO: task kworker/0:204:3980 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: d5737000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 Exception stack(0xe058dfb0 to 0xe058dff8) INFO: task kworker/0:205:3981 blocked for more than 455 seconds. r4:848a9800 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea969e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848334c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:848a9800 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e004b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:850ba78c r4:850ba400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850ba78c r4:8480fc00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848a9800 r8:8480fc2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8480fc00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8480fc00 r8:80287e08 r7:ea965e60 r6:8480fc80 r5:848a9800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea969fb0 to 0xea969ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84833000 INFO: task kworker/0:205:3981 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: d5b3e000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea95de08 r5:850ba38c r4:850ba000 r10:00000000 r9:8480fd00 r8:80287e08 r7:ea969e60 r6:8480fd80 r5:848aa400 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84833200 INFO: task kworker/0:206:3984 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: d607d000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 dfa0: 00000000 00000000 00000000 00000000 r4:848ab000 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:850bab8c r4:850ba800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Workqueue: events bpf_prog_free_deferred dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea971e08 r5:850baf8c r4:850bac00 r10:61c88647 r9:848abc00 r8:8480ff2c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84833440 INFO: task kworker/0:208:3987 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: d664c000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: r4:848ad400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848ad400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea979e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84833940 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:848ad400 r7:00000000 r6:83018000 r5:00001000 r4:7f04d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00dd000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:850bb38c r4:850bb000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850bb38c r4:850cd000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848ad400 r8:850cd02c r7:82804d40 r6:dddced80 r5:dddceda0 r4:850cd000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850cd000 r8:80287e08 r7:ea971e60 r6:850cd080 r5:848ad400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea979fb0 to 0xea979ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) dd60: 80230ad0 80239bb0 80000113 ffffffff r4:e058ddc0 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84bbbe80 Exception stack(0xe058dfb0 to 0xe058dff8) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:e00f9000 r5:850bb78c r4:850bb400 r10:61c88647 r9:8507b000 r8:850cd12c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xe058dd28 to 0xe058dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 INFO: task kworker/0:211:3993 blocked for more than 455 seconds. Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ea981d84 r8:00000002 r7:60000013 r6:ea981d8c r5:8507a400 r4:8507a400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8507a400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea981e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84833c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8507a400 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e011b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:850bbb8c r4:850bb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850bbb8c r4:850cd180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8507a400 r8:850cd1ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:850cd180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850cd180 r8:80287e08 r7:ea97de60 r6:84816300 r5:8507a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea981fb0 to 0xea981ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84833880 INFO: task kworker/0:211:3993 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: d6c1c000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:84ba8680 Workqueue: events bpf_prog_free_deferred r5:8507e000 r4:8291a680 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:850bbf8c r4:850bbc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8507e000 r8:850cd22c r7:82804d40 r6:dddced80 r5:dddceda0 r4:850cd200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850cd200 r8:80287e08 r7:ea981e60 r6:84816380 r5:8507e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea985fb0 to 0xea985ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84833b00 INFO: task kworker/0:212:3994 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: d6ed2000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:84bbbe80 Exception stack(0xe058dfb0 to 0xe058dff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r10:8291a684 r9:ea975d84 r8:00000002 r7:60000013 r6:ea975d8c r5:8507ec00 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:850c438c r4:850c4000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850c438c r4:850cd280 r10:61c88647 r9:8507ec00 r8:850cd2ac r7:82804d40 r6:dddced80 r5:dddceda0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xe058dd28 to 0xe058dd70) r4:e058ddc0 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ea98dd84 r8:00000002 r7:60000113 r6:ea98dd8c r5:8507d400 r4:8507d400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8507d400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea98de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850df040 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8507d400 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbed000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84713f8c r4:84713c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84713f8c r4:84816480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8507d400 r8:848164ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84816480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84816480 r8:80287e08 r7:e0441e60 r6:84816500 r5:8507d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea98dfb0 to 0xea98dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84837780 INFO: task kworker/1:229:3998 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: d7347000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r10:8291a684 r9:ea991d84 r8:00000002 r7:60000013 r6:ea991d8c r5:8507c800 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea991e08 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:850c478c r4:850c4400 r10:61c88647 r9:8507c800 r8:850cd32c r7:82804d40 r6:dddced80 r5:dddceda0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: d7347000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:215:4003 blocked for more than 455 seconds. r10:8291a684 r9:ea995d84 r8:00000002 r7:60000113 r6:ea995d8c r5:8507bc00 r4:00000000 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:850c4b8c r4:850c4800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:8507bc00 r8:850cd3ac r7:82804d40 r6:dddced80 r5:dddceda0 task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:216:4005 blocked for more than 455 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:216 state:D stack:0 pid:4005 tgid:4005 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ea999d84 r8:00000002 r7:60000113 r6:ea999d8c r5:85080000 r4:85080000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85080000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea999e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850ce100 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85080000 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e4801000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:850c4f8c r4:850c4c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850c4f8c r4:850cd400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85080000 r8:850cd42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:850cd400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850cd400 r8:80287e08 r7:ea995e60 r6:84816680 r5:85080000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea999fb0 to 0xea999ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84833e00 INFO: task kworker/0:216:4005 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: d7a9c000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: r5:848aec00 r4:8291a680 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9a1e08 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:850c538c r4:850c5000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850c538c r4:850cd480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848aec00 r8:850cd4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:850cd480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850cd480 r8:80287e08 r7:ea999e60 r6:850cd500 r5:848aec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9a1fb0 to 0xea9a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850ce080 INFO: task kworker/0:217:4007 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: d7e9c000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:218:4009 blocked for more than 455 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:218 state:D stack:0 pid:4009 tgid:4009 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:848ae000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea989e08 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e4861000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:850c578c r4:850c5400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850c578c r4:850cd580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848ae000 r8:850cd5ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:850cd580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850cd580 r8:80287e08 r7:ea9a1e60 r6:850cd600 r5:848ae000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea989fb0 to 0xea989ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850ce280 INFO: task kworker/0:218:4009 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: d7e9c000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8291a684 r9:ea9a5d84 r8:00000002 r7:60000113 r6:ea9a5d8c r5:848ac800 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:850c5b8c r4:850c5800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d0000 [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:850c638c r4:850cd780 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850ce540 INFO: task kworker/0:220:4014 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: d829c000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:221:4015 blocked for more than 455 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:221 state:D stack:0 pid:4015 tgid:4015 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ea9add84 r8:00000002 r7:60000113 r6:ea9add8c r5:849d0c00 r4:849d0c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:849d0c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850ce800 r5:850c5f8c r4:850c5c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfa0: 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe058dd28 to 0xe058dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ea9c1d84 r8:00000002 r7:60000013 r6:ea9c1d8c r5:849d2400 r4:849d2400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:849d2400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9c1e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850cec40 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:849d2400 r7:00000000 r6:83018000 r5:00001000 r4:7f069000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9c3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:850c678c r4:850c6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850c678c r4:850cd980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:849d2400 r8:850cd9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:850cd980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850cd980 r8:80287e08 r7:ea9a9e60 r6:850cda00 r5:849d2400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9c1fb0 to 0xea9c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850ce840 INFO: task kworker/0:222:4017 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: d8844000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 INFO: task kworker/0:223:4019 blocked for more than 455 seconds. r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9cde08 r5:00001000 r4:ea9f3000 r5:850c738c r4:850c7000 r10:61c88647 r9:849d3c00 r8:850cdaac r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xe058dd28 to 0xe058dd70) [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r5:849d4800 r4:8291a680 r4:00000000 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:850c6b8c r4:850cdb80 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9e1fb0 to 0xea9e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850ce900 INFO: task kworker/0:224:4021 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: d8e0b000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:225:4022 blocked for more than 455 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:225 state:D stack:0 pid:4022 tgid:4022 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ea9e5d84 r8:00000002 r7:60000113 r6:ea9e5d8c r5:85080c00 r4:85080c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85080c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9e5e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84809a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85080c00 r7:00000000 r6:83018000 r5:00001000 r4:7f015000 r5:8514cb8c r4:8514c800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8514cb8c r4:850cdc00 r10:00000000 r9:850cdc00 r8:80287e08 r7:ea9cde60 r6:84816780 r5:85080c00 INFO: task kworker/0:225:4022 is blocked on a mutex likely owned by task kworker/1:201:3654. Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: d8e0b000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r5:849d3000 r4:8291a680 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84791840 r5:850c778c r4:850c7400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:850cdc80 r8:80287e08 r7:ea9cde60 r6:850cdd00 r5:849d3000 Workqueue: events bpf_prog_free_deferred r4:00000000 Exception stack(0xe058dd28 to 0xe058dd70) dd20: d8e0b000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:227:4027 blocked for more than 455 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:227 state:D stack:0 pid:4027 tgid:4027 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ea9f1d84 r8:00000002 r7:60000113 r6:ea9f1d8c r5:849d5400 r4:849d5400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:849d5400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9f1e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84809e80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:849d5400 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8514d78c r4:8514d400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:850cdd80 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xe058dd28 to 0xe058dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfa0: 00000000 00000000 00000000 00000000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:228:4028 blocked for more than 455 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:228 state:D stack:0 pid:4028 tgid:4028 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaa01d84 r8:00000002 r7:60000113 r6:eaa01d8c r5:849d6000 r4:849d6000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:849d6000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa01e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850d9240 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:849d6000 r7:00000000 r6:83018000 r5:00001000 r4:7f09f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e06ed000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:850c7b8c r4:850c7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850c7b8c r4:850cde80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:849d6000 r8:850cdeac r7:82804d40 r6:dddced80 r5:dddceda0 r4:850cde80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850cde80 r8:80287e08 r7:ea9f1e60 r6:850cdf00 r5:849d6000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa01fb0 to 0xeaa01ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84791c80 INFO: task kworker/0:228:4028 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: d959b000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6c00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa0de08 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8471338c r4:84713000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: d98c3000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Not tainted 6.15.0-rc7-syzkaller #0 r5:85110c00 r4:8291a680 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850df400 r5:8471378c r4:84713400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:84816880 r8:80287e08 r7:eaa0de60 r6:850d3000 r5:85110c00 INFO: task kworker/1:231:4033 is blocked on a mutex likely owned by task kworker/1:201:3654. dd60: 80230ad0 80239bb0 80000113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfa0: 00000000 00000000 00000000 00000000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:232:4035 blocked for more than 455 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:232 state:D stack:0 pid:4035 tgid:4035 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaa1dd84 r8:00000002 r7:60000113 r6:eaa1dd8c r5:85110000 r4:85110000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85110000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa1de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850df7c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85110000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfebd000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8501478c r4:85014400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8501478c r4:84816900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85110000 r8:8481692c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84816900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84816900 r8:80287e08 r7:eaa0de60 r6:850d3080 r5:85110000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa1dfb0 to 0xeaa1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850df280 INFO: task kworker/1:232:4035 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd60: 80230ad0 80239bb0 80000113 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850df680 r5:8501438c r4:85014000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred dd60: 80230ad0 80239bb0 80000113 ffffffff r4:e058ddc0 r5:00001000 r4:dfb45000 r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:234:4039 blocked for more than 455 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:234 state:D stack:0 pid:4039 tgid:4039 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaa2dd84 r8:00000002 r7:60000113 r6:eaa2dd8c r5:85112400 r4:85112400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85112400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa2de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84837e40 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85112400 r7:00000000 r6:83018200 r5:00001000 r4:7f087000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e045f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8501638c r4:85016000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8501638c r4:84816a00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85112400 r8:84816a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84816a00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84816a00 r8:80287e08 r7:eaa1de60 r6:850d3180 r5:85112400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa2dfb0 to 0xeaa2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850df500 INFO: task kworker/1:234:4039 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: d9d8a000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:235:4041 blocked for more than 455 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:235 state:D stack:0 pid:4041 tgid:4041 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaa35d84 r8:00000002 r7:60000113 r6:eaa35d8c r5:85113000 r4:85113000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85113000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa35e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:85014b8c r4:85014800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85113000 r8:84816aac r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d80 r6:83018200 r5:85014f8c r4:84816b00 r10:61c88647 r9:85113c00 r8:84816b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84816b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84816b00 r8:80287e08 r7:eaa2de60 r6:850d3280 r5:85113c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850df780 INFO: task kworker/1:236:4043 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: da05d000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:237:4045 blocked for more than 455 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:237 state:D stack:0 pid:4045 tgid:4045 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r5:85116000 r4:8291a680 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8501538c r4:85015000 r7:ddde2d80 r6:83018200 r5:8501538c r4:84816b80 r10:00000000 r9:84816b80 r8:80287e08 r7:eaa2de60 r6:850d3300 r5:85116000 INFO: task kworker/1:237:4045 is blocked on a mutex likely owned by task kworker/1:201:3654. dd60: 80230ad0 80239bb0 80000113 ffffffff r4:e058ddc0 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:84ba8680 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:dff95000 r5:8501578c r4:85015400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: da3e1000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:239:4049 blocked for more than 455 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:239 state:D stack:0 pid:4049 tgid:4049 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaa55d84 r8:00000002 r7:60000113 r6:eaa55d8c r5:849d1800 r4:849d1800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:849d1800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa55e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850dfe40 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:849d1800 r7:00000000 r6:83018200 r5:00001000 r4:7f083000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffc9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85015b8c r4:85015800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85015b8c r4:84816c80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:849d1800 r8:84816cac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84816c80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84816c80 r8:80287e08 r7:eaa2de60 r6:850d3400 r5:849d1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa55fb0 to 0xeaa55ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r5:80000113 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0725e08 r5:00001000 r4:e0009000 r5:85015f8c r4:85015c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85015f8c r4:84816d00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85083000 r8:84816d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84816d00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84816d00 r8:80287e08 r7:eaa2de60 r6:84816d80 r5:85083000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0725fb0 to 0xe0725ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850dfc40 INFO: task kworker/1:240:4051 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: dabb5000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 INFO: task kworker/1:241:4055 blocked for more than 455 seconds. r5:85083c00 r4:8291a680 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8482a040 r5:8501678c r4:85016400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85083c00 r8:84816e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 dd60: 80230ad0 80239bb0 80000113 ffffffff r4:e058ddc0 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85084800 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa61e08 r9:83018205 r8:85084800 r7:00000000 r6:83018200 r5:00001000 r4:7f08b000 r5:85016b8c r4:85016800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85016b8c r4:84816f00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85084800 r8:84816f2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84816f00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84816f00 r8:80287e08 r7:eaa59e60 r6:84816f80 r5:85084800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa61fb0 to 0xeaa61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8482a1c0 INFO: task kworker/1:242:4056 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: dabb5000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 INFO: task kworker/1:243:4058 blocked for more than 455 seconds. r4:85085400 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa65e08 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8517c38c r4:8517c000 r7:ddde2d80 r6:83018200 r5:8517c38c r4:84832000 r10:00000000 r9:84832000 r8:80287e08 r7:eaa61e60 r6:84832080 r5:85085400 Workqueue: events bpf_prog_free_deferred dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:85086000 r4:8291a680 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:e04bb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85016f8c r4:85016c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85016f8c r4:84832100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85086000 r8:8483212c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84832100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84832100 r8:80287e08 r7:eaa65e60 r6:84832180 r5:85086000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa69fb0 to 0xeaa69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8482a180 INFO: task kworker/1:244:4060 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: dabb5000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:245:4062 blocked for more than 455 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:8501738c r4:85017000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:84832200 r8:80287e08 r7:eaa65e60 r6:84832280 r5:85081800 INFO: task kworker/1:245:4062 is blocked on a mutex likely owned by task kworker/1:201:3654. dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:85082400 r7:00000000 r6:83018200 r5:00001000 r4:7f091000 r5:8501778c r4:85017400 r10:61c88647 r9:85082400 r8:8483232c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8482a640 Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: db050000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:247:4066 blocked for more than 455 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:247 state:D stack:0 pid:4066 tgid:4066 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaa6dd84 r8:00000002 r7:60000013 r6:eaa6dd8c r5:85088000 r4:85088000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85088000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa6de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8482aa00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85088000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e053d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85017b8c r4:85017800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85017b8c r4:84832400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85088000 r8:8483242c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84832400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84832400 r8:80287e08 r7:eaa65e60 r6:84832480 r5:85088000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa6dfb0 to 0xeaa6dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8482a880 INFO: task kworker/1:247:4066 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 dd60: 80230ad0 80239bb0 80000113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:85088c00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa7de08 r5:00001000 r4:e059b000 r5:85017f8c r4:85017c00 r10:61c88647 r9:85088c00 r8:8483252c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xe058dd28 to 0xe058dd70) [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:249:4070 blocked for more than 455 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:249 state:D stack:0 pid:4070 tgid:4070 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaa81d84 r8:00000002 r7:60000013 r6:eaa81d8c r5:85089800 r4:85089800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85089800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa81e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8482af80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85089800 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e06b5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8517cb8c r4:8517c800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8517cb8c r4:84832600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85089800 r8:8483262c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84832600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84832600 r8:80287e08 r7:eaa65e60 r6:84832680 r5:85089800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa81fb0 to 0xeaa81ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8482aa80 INFO: task kworker/1:249:4070 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: dbe24000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:84ba8680 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8517c78c r4:8517c400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8517c78c r4:84832700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8508a400 r8:8483272c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84832700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84832700 r8:80287e08 r7:eaa81e60 r6:84832780 r5:8508a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa79fb0 to 0xeaa79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8482ac00 INFO: task kworker/1:250:4072 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: dc055000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:8508b000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 r5:850c7f8c r4:850c7c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 r4:850dff00 Call trace: dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:252:4076 blocked for more than 456 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:252 state:D stack:0 pid:4076 tgid:4076 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaa8dd84 r8:00000002 r7:60000013 r6:eaa8dd8c r5:8508c800 r4:8508c800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8508c800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa8de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850dfc40 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8508c800 r7:00000000 r6:83018200 r5:00001000 r4:7f09d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e06db000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8517cf8c r4:8517cc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8517cf8c r4:84832900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8508c800 r8:8483292c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84832900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84832900 r8:80287e08 r7:eaa85e60 r6:84832980 r5:8508c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa8dfb0 to 0xeaa8dff8) dfa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 Exception stack(0xe058dd28 to 0xe058dd70) dd20: dc44a000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:229:4077 blocked for more than 456 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:229 state:D stack:0 pid:4077 tgid:4077 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaa89d84 r8:00000002 r7:60000113 r6:eaa89d8c r5:8511a400 [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8514c38c r4:8514c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 r4:00000000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:253:4079 blocked for more than 456 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:253 state:D stack:0 pid:4079 tgid:4079 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaa95d84 r8:00000002 r7:60000013 r6:eaa95d8c r5:85118000 r4:85118000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85118000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa95e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84810380 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85118000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e070f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8517d38c r4:8517d000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8517d38c r4:84832a00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85118000 r8:84832a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84832a00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84832a00 r8:80287e08 r7:eaa85e60 r6:850d3580 r5:85118000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84810140 INFO: task kworker/1:253:4079 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: dcd2b000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8511bc00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa9de08 r9:83018205 r8:8511bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a3000 r5:8517d78c r4:8517d400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:84832a80 r8:80287e08 r7:eaa85e60 r6:850d3600 r5:8511bc00 r4:84810100 INFO: task kworker/1:254:4081 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: dcd2b000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 r4:84bbbe80 Exception stack(0xe058dfb0 to 0xe058dff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r5:8511c800 r4:8291a680 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:8517db8c r4:8517d800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:8511c800 r8:84832b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:256:4086 blocked for more than 456 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:256 state:D stack:0 pid:4086 tgid:4086 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaaa5d84 r8:00000002 r7:60000013 r6:eaaa5d8c r5:8511d400 r4:8511d400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8511d400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaaa5e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848108c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8511d400 r7:00000000 r6:83018200 r5:00001000 r4:7f0ab000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e88ab000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8517df8c r4:8517dc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8517df8c r4:84832b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8511d400 r8:84832bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84832b80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84832b80 r8:80287e08 r7:eaaa1e60 r6:850d3700 r5:8511d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaaa5fb0 to 0xeaaa5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:848105c0 INFO: task kworker/1:256:4086 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r5:84be038c r4:84be0000 r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r5:8511e000 r4:8291a680 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:8514cf8c r4:8514cc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8514cf8c r4:850d3780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8511e000 r8:850d37ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:850d3780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850d3780 r8:80287e08 r7:ea9f1e60 r6:850d3800 r5:8511e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa91fb0 to 0xeaa91ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84809440 INFO: task kworker/0:230:4088 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: dd3a6000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8514c78c r4:8514c400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:84832c00 9fa0: 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe058dd28 to 0xe058dd70) [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8511b000 [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ea9fd000 r5:8517e38c r4:8517e000 r10:61c88647 r9:8511b000 r8:84832cac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaab5fb0 to 0xeaab5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84810940 INFO: task kworker/1:258:4091 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: dd649000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:231:4096 blocked for more than 456 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:231 state:D stack:0 pid:4096 tgid:4096 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaa99d84 r8:00000002 r7:60000113 r6:eaa99d8c r5:85118c00 r4:85118c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85118c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa99e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84809d80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85118c00 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8514d38c r4:8514d000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8514d38c r4:850d3980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85118c00 r8:850d39ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:850d3980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850d3980 r8:80287e08 r7:ea9f1e60 r6:850d3a00 r5:85118c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa99fb0 to 0xeaa99ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84809900 INFO: task kworker/0:231:4096 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: dd99e000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:85119800 r4:8291a680 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8515ab8c r4:8515a800 r7:ddde2d80 r6:83018200 r5:8515ab8c r4:84832d00 r10:00000000 r9:84832d00 r8:80287e08 r7:eaaa9e60 r6:850d3a80 r5:85119800 Workqueue: events bpf_prog_free_deferred Exception stack(0xe058dd28 to 0xe058dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:85086c00 r4:8291a680 [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9d9e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84835a40 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85086c00 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9e9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8517e78c r4:8517e400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8517e78c r4:84832d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85086c00 r8:84832dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84832d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84832d80 r8:80287e08 r7:ea9bde60 r6:850d3b00 r5:85086c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9d9fb0 to 0xea9d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84810b40 INFO: task kworker/1:260:4098 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: de2ca000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 r4:84bbbe80 Exception stack(0xe058dfb0 to 0xe058dff8) INFO: task kworker/0:232:4102 blocked for more than 456 seconds. r5:85116c00 r4:8291a680 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84809fc0 r5:8514db8c r4:8514d800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8514db8c r4:850d3b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85116c00 r8:850d3bac r7:82804d40 r6:dddced80 r5:dddceda0 r4:850d3b80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850d3b80 r8:80287e08 r7:ea9f1e60 r6:850d3c00 r5:85116c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9c9fb0 to 0xea9c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84809c80 INFO: task kworker/0:232:4102 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: de2ca000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:233:4104 blocked for more than 456 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:233 state:D stack:0 pid:4104 tgid:4104 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaac5d84 r8:00000002 r7:60000013 r6:eaac5d8c r5:85114800 r4:85114800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r4:00000000 r4:00000000 r5:8514df8c r4:8514dc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xe058dd28 to 0xe058dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:234:4105 blocked for more than 456 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:234 state:D stack:0 pid:4105 tgid:4105 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ea9edd84 r8:00000002 r7:60000013 r6:ea9edd8c r5:84a88000 r4:84a88000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a88000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9ede08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84823180 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a88000 r7:00000000 r6:83018000 r5:00001000 r4:7f033000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd5f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8514e38c r4:8514e000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8514e38c r4:850d3d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a88000 r8:850d3dac r7:82804d40 r6:dddced80 r5:dddceda0 r4:850d3d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850d3d80 r8:80287e08 r7:eaac5e60 r6:850d3e00 r5:84a88000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9edfb0 to 0xea9edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84809740 INFO: task kworker/0:234:4105 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: de41a000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:dfb45000 r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r9:83018005 r8:84a88c00 r7:00000000 r6:83018000 r5:00001000 r4:7f035000 r5:8514e78c r4:8514e400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8514e78c r4:850d3e80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a88c00 r8:850d3eac r7:82804d40 r6:dddced80 r5:dddceda0 r4:850d3e80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850d3e80 r8:80287e08 r7:ea9ede60 r6:850d3f00 r5:84a88c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaac9fb0 to 0xeaac9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:848232c0 INFO: task kworker/0:235:4107 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r4:00000000 dd60: 80230ad0 80239bb0 80000113 ffffffff r4:e058ddc0 r5:00001000 r4:dfb45000 r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 Exception stack(0xe058dfb0 to 0xe058dff8) INFO: task kworker/0:236:4109 blocked for more than 456 seconds. r4:84a8a400 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaad1e08 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8514eb8c r4:8514e800 r10:61c88647 r9:84a8a400 r8:850d3fac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xe058dd28 to 0xe058dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r5:84be038c r4:84be0000 r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:237:4111 blocked for more than 456 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:237 state:D stack:0 pid:4111 tgid:4111 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaad5d84 r8:00000002 r7:60000113 r6:eaad5d8c r5:84a8bc00 r4:84a8bc00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a8bc00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaad5e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84823000 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a8bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f039000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdfd000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8514ef8c r4:8514ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8514ef8c r4:8482f080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a8bc00 r8:8482f0ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8482f080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8482f080 r8:80287e08 r7:eaad1e60 r6:8482f100 r5:84a8bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaad5fb0 to 0xeaad5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84823400 INFO: task kworker/0:237:4111 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: dec63000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:238:4114 blocked for more than 456 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Workqueue: events bpf_prog_free_deferred [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84823a80 r5:8514f78c r4:8514f400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84a89800 r8:8482f1ac r7:82804d40 r6:dddced80 r5:dddceda0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe058dd28 to 0xe058dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:239:4115 blocked for more than 456 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:239 state:D stack:0 pid:4115 tgid:4115 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaad9d84 r8:00000002 r7:60000113 r6:eaad9d8c r5:84a8c800 r4:84a8c800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a8c800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaad9e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84823880 r9:83018005 r8:84a8c800 r7:00000000 r6:83018000 r5:00001000 r4:7f03b000 r5:8514f38c r4:8514f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8514ff8c r4:8514fc00 r4:8482f380 dfa0: 00000000 00000000 00000000 00000000 Call trace: dd20: df103000 dfadb000 00000001 80239b98 7f2f7000 00000001 r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 r4:e058ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:241:4120 blocked for more than 456 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:241 state:D stack:0 pid:4120 tgid:4120 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaae1d84 r8:00000002 r7:60000113 r6:eaae1d8c r5:84a8e000 r4:84a8e000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a8e000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaae1e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84823c00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a8e000 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0041000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8514fb8c r4:8514f800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8514fb8c r4:8482f480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a8e000 r8:8482f4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8482f480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8482f480 r8:80287e08 r7:eaadde60 r6:8482f500 r5:84a8e000 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred dd60: 80230ad0 80239bb0 80000113 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e058ddc0 r5:e058de08 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xe058dfb0 to 0xe058dff8) r4:84ba8680 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaaede08 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8515838c r4:85158000 r10:00000000 r9:8482f580 r8:80287e08 r7:eaadde60 r6:84832e00 r5:8508d400 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xe058dd28 to 0xe058dd70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba88c0 r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be038c r4:84be0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be038c r4:84bbbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbe80 r8:80287e08 r7:e0581e60 r6:84bbef80 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:243:4122 blocked for more than 456 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:243 state:D stack:0 pid:4122 tgid:4122 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaaf5d84 r8:00000002 r7:60000113 r6:eaaf5d8c r5:8508e000 r4:8508e000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8508e000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaaf5e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84823ec0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8508e000 r7:00000000 r6:83018000 r5:00001000 r4:7f043000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:850c6f8c r4:850c6c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850c6f8c r4:8482f600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8508e000 r8:8482f62c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8482f600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8482f600 r8:80287e08 r7:eaaede60 r6:84832e80 r5:8508e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaaf5fb0 to 0xeaaf5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84823a00 INFO: task kworker/0:243:4122 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe058dd28 to 0xe058dd70) dd20: df984000 dfadb000 00000001 80239b98 7f2f7000 00000001 dd40: 82ac15a0 7f2f7000 dfadb000 8280c928 82ac21c4 e058dda4 e058dda8 e058dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r5:00001000 r4:dfb45000 r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:8291a684 r9:eab01d84 r8:00000002 r7:60000013 r6:eab01d8c r5:851b9800 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab01e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850c9040 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:851b9800 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e011d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8515878c r4:85158400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8515878c r4:8482f680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851b9800 r8:8482f6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8482f680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8482f680 r8:80287e08 r7:eaaede60 r6:84832f00 r5:851b9800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab01fb0 to 0xeab01ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850c9000 INFO: task kworker/0:244:4126 is blocked on a mutex likely owned by task kworker/1:201:3654. task:kworker/1:201 state:R running task stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b8d400 r8:80200be4 r7:e058dd5c r6:ffffffff r5:84b8d400 dd60: 80230ad0 80239bb0 80000113 ffffffff r4:e058ddc0 r5:00001000 r4:dfb45000 r10:61c88647 r9:84b8d400 r8:84bbbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfa0: 00000000 00000000 00000000 00000000 task:kworker/0:245 state:D stack:0 pid:4127 tgid:4127 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eab05d84 r8:00000002 r7:60000113 r6:eab05d8c r5:851ba400 r4:851ba400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:851ba400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab05e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850c9300 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:851ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0547000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85158b8c r4:85158800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85158b8c r4:8482f700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851ba400 r8:8482f72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8482f700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8482f700 r8:80287e08 r7:eab01e60 r6:84832f80 r5:851ba400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab05fb0 to 0xeab05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850c9000 INFO: task kworker/0:245:4127 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 Exception stack(0xe05add28 to 0xe05add70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaae9e08 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a8ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0767000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85158f8c r4:85158c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85158f8c r4:8482f780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a8ec00 r8:8482f7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8482f780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8482f780 r8:80287e08 r7:eab05e60 r6:8482f800 r5:84a8ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaae9fb0 to 0xeaae9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850c9180 INFO: task kworker/0:246:4129 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 dd60: 80230ad0 80239bb0 900f0013 ffffffff r4:e05addc0 r5:00001000 r4:dfd07000 r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:e07ed000 r5:8515978c r4:85159400 r10:61c88647 r9:84a8b000 r8:8482f8ac r7:82804d40 r6:dddced80 r5:dddceda0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r9:83018005 r8:85120000 r7:00000000 r6:83018000 r5:00001000 r4:7f04d000 r5:8515938c r4:85159000 r10:61c88647 r9:85120000 r8:8482f9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8482f980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8482f980 r8:80287e08 r7:eab09e60 r6:8482fa00 r5:85120000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaae5fb0 to 0xeaae5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850c9180 INFO: task kworker/0:248:4132 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: 7fb2d000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 900f0013 ffffffff r5:900f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:249:4135 blocked for more than 456 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:249 state:D stack:0 pid:4135 tgid:4135 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r4:85120c00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab0de08 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85159b8c r4:85159800 r7:dddced80 r6:83018000 r5:85159b8c r4:8482fa80 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred dd20: 7fde9000 dfb0b000 00000001 80239b98 7f2f9000 00000001 r4:e05addc0 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:84ba87c0 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850c9a40 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85121800 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e4871000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85159f8c r4:85159c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85159f8c r4:8482fb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85121800 r8:8482fbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8482fb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8482fb80 r8:80287e08 r7:eab0de60 r6:8482fc00 r5:85121800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab15fb0 to 0xeab15ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850c9780 INFO: task kworker/0:250:4138 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: 7fde9000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 900f0013 ffffffff r5:900f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:85122400 r7:00000000 r6:83018000 r5:00001000 r4:7f06b000 r5:8515bb8c r4:8515b800 r10:61c88647 r9:85122400 r8:8482fcac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xe05add28 to 0xe05add70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r5:84be078c r4:84be0400 r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85123c00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab11e08 r5:00001000 r4:e88fb000 r5:8515a38c r4:8515a000 r10:61c88647 r9:85123c00 r8:8482fdac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: 8065d000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:253:4142 blocked for more than 456 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:253 state:D stack:0 pid:4142 tgid:4142 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eab21d84 r8:00000002 r7:60000113 r6:eab21d8c r5:85124800 r4:85124800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85124800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab21e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850c9dc0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85124800 r7:00000000 r6:83018000 r5:00001000 r4:7f057000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9b1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8515a78c r4:8515a400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8515a78c r4:8482fe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85124800 r8:8482feac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8482fe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8482fe80 r8:80287e08 r7:eab19e60 r6:8482ff00 r5:85124800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab21fb0 to 0xeab21ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:800f0013 r4:80239bb0 r4:e05addc0 r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 r4:84bbbf00 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:851b8000 r7:00000000 r6:83018000 r5:00001000 r4:7f05f000 r5:8515af8c r4:8515ac00 r10:61c88647 r9:851b8000 r8:8482ffac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:261:4147 blocked for more than 456 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:261 state:D stack:0 pid:4147 tgid:4147 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eab25d84 r8:00000002 r7:60000113 r6:eab25d8c r5:851bb000 r4:851bb000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:851bb000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab25e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850e2540 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:851bb000 r7:00000000 r6:83018200 r5:00001000 r4:7f065000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab59000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8515b38c r4:8515b000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8515b38c r4:850e9080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851bb000 r8:850e90ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:800f0013 r4:80239bb0 r4:e05addc0 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84bbbf00 Exception stack(0xe05adfb0 to 0xe05adff8) r4:84ba87c0 Workqueue: events bpf_prog_free_deferred r5:851bbc00 r4:8291a680 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:8517eb8c r4:8517e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:850e9180 1fa0: 00000000 00000000 00000000 00000000 task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:800f0013 r4:80239bb0 r4:e05addc0 r5:00001000 r4:dfd07000 r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xe05adfb0 to 0xe05adff8) r4:84ba87c0 Workqueue: events bpf_prog_free_deferred r4:851bc800 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab3de08 r4:00000000 r5:8517ef8c r4:8517ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8517ef8c r4:850e9280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851bc800 r8:850e92ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850e9280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850e9280 r8:80287e08 r7:eab25e60 r6:850e9300 r5:851bc800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab3dfb0 to 0xeab3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84835cc0 INFO: task kworker/1:263:4151 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: 815d2000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:264:4154 blocked for more than 456 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:264 state:D stack:0 pid:4154 tgid:4154 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eab51d84 r8:00000002 r7:60000113 r6:eab51d8c r5:851bd400 r4:851bd400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:851bd400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab51e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84835f00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:851bd400 r7:00000000 r6:83018200 r5:00001000 r4:7f063000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab4d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8517f38c r4:8517f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8517f38c r4:850e9380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851bd400 r8:850e93ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850e9380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850e9380 r8:80287e08 r7:eab25e60 r6:850e9400 r5:851bd400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab51fb0 to 0xeab51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:255:4155 blocked for more than 456 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:255 state:D stack:0 pid:4155 tgid:4155 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eab61d84 r8:00000002 r7:60000013 r6:eab61d8c r5:851be000 r4:851be000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:851be000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab61e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850e2780 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:851be000 r7:00000000 r6:83018000 r5:00001000 r4:7f069000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab75000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8515b78c r4:8515b400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8515b78c r4:850dc000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851be000 r8:850dc02c r7:82804d40 r6:dddced80 r5:dddceda0 r4:850dc000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850dc000 r8:80287e08 r7:eab19e60 r6:850e9480 r5:851be000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab61fb0 to 0xeab61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: dd20: 815d2000 dfb0b000 00000001 80239b98 7f2f9000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:851bec00 r4:8291a680 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850f8640 r5:8518c38c r4:8518c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:850e9500 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/1:265:4157 is blocked on a mutex likely owned by task kworker/1:202:3656. r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: 81689000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:266:4159 blocked for more than 456 seconds. Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8517f78c r4:8517f400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8517f78c r4:850e9600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851b8c00 r8:850e962c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850e9600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850e9600 r8:80287e08 r7:eab5de60 r6:850e9680 r5:851b8c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab6dfb0 to 0xeab6dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84835fc0 INFO: task kworker/1:266:4159 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: 81689000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Not tainted 6.15.0-rc7-syzkaller #0 r4:851c0000 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 r5:8515bf8c r4:8515bc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8515bf8c r4:850dc080 r10:61c88647 r9:851c0000 r8:850dc0ac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 dd60: 80230ad0 80239bb0 800f0013 ffffffff r4:e05addc0 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 INFO: task kworker/0:257:4164 blocked for more than 456 seconds. r5:851c1800 r4:8291a680 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab99e08 r5:00001000 r4:dfe8d000 r5:85160b8c r4:85160800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fa0: 00000000 00000000 00000000 00000000 Call trace: r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: 82028000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:258:4165 blocked for more than 456 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:258 state:D stack:0 pid:4165 tgid:4165 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eab9dd84 r8:00000002 r7:60000013 r6:eab9dd8c r5:851c2400 r4:851c2400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:851c2400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab9de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850e2d80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:851c2400 r7:00000000 r6:83018000 r5:00001000 r4:7f071000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfcc1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8516078c r4:85160400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:851c2400 r8:850dc1ac r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xe05add28 to 0xe05add70) r4:82ac21e4 r4:e05addc0 r5:00001000 r4:dfd07000 r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xe05adfb0 to 0xe05adff8) r4:84ba87c0 Workqueue: events bpf_prog_free_deferred r5:851c3000 r4:8291a680 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850e3380 r5:8517fb8c r4:8517f800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:851c3000 r8:850e98ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe05add28 to 0xe05add70) r4:82ac21e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:268:4169 blocked for more than 456 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:268 state:D stack:0 pid:4169 tgid:4169 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eab79d84 r8:00000002 r7:60000113 r6:eab79d8c r5:851c3c00 r4:851c3c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:851c3c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab79e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850e3580 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:851c3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f073000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8517ff8c r4:8517fc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8517ff8c r4:850e9980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851c3c00 r8:850e99ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850e9980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850e9980 r8:80287e08 r7:eab5de60 r6:850e9a00 r5:851c3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab79fb0 to 0xeab79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850e32c0 INFO: task kworker/1:268:4169 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: 82697000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 dfa0: 00000000 00000000 00000000 00000000 task:kworker/1:269 state:D stack:0 pid:4172 tgid:4172 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab85e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850e3880 r5:84712f8c r4:84712c00 r7:ddde2d80 r6:83018200 r5:84712f8c r4:850e9a80 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: dd20: 82a97000 dfb0b000 00000001 80239b98 7f2f9000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:259:4174 blocked for more than 456 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:259 state:D stack:0 pid:4174 tgid:4174 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaba5d84 r8:00000002 r7:60000013 r6:eaba5d8c r5:851c5400 r4:851c5400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:851c5400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaba5e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850e2980 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:851c5400 r7:00000000 r6:83018000 r5:00001000 r4:7f077000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfee5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85160f8c r4:85160c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85160f8c r4:850dc200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851c5400 r8:850dc22c r7:82804d40 r6:dddced80 r5:dddceda0 r4:850dc200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850dc200 r8:80287e08 r7:eab99e60 r6:850e9b80 r5:851c5400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaba5fb0 to 0xeaba5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850e2dc0 INFO: task kworker/0:259:4174 is blocked on a mutex likely owned by task kworker/1:202:3656. r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:82ac21e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:260:4176 blocked for more than 456 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:260 state:D stack:0 pid:4176 tgid:4176 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaba9d84 r8:00000002 r7:60000113 r6:eaba9d8c r5:851c6000 r4:851c6000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:851c6000 r4:8291a680 [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:8516138c r4:85161000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8516138c r4:850dc280 r10:61c88647 r9:851c6000 r8:850dc2ac r7:82804d40 r6:dddced80 r5:dddceda0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred dd20: 82fd5000 dfb0b000 00000001 80239b98 7f2f9000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 Exception stack(0xe05adfb0 to 0xe05adff8) r4:84ba87c0 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: 8349f000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:270:4180 blocked for more than 456 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:270 state:D stack:0 pid:4180 tgid:4180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eabb1d84 r8:00000002 r7:60000113 r6:eabb1d8c r5:851c0c00 r4:851c0c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:851c0c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabb1e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:8518cb8c r4:8518c800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe05add28 to 0xe05add70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:84ba87c0 Workqueue: events bpf_prog_free_deferred [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r9:83018005 r8:85123000 r7:00000000 r6:83018000 r5:00001000 r4:7f07f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0443000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85161b8c r4:85161800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85161b8c r4:850dc380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85123000 r8:850dc3ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:850dc380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850dc380 r8:80287e08 r7:eaba1e60 r6:850dc400 r5:85123000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabadfb0 to 0xeabadff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84810540 INFO: task kworker/0:262:4182 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: 8361a000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:263:4184 blocked for more than 457 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:263 state:D stack:0 pid:4184 tgid:4184 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eabb5d84 r8:00000002 r7:60000013 r6:eabb5d8c r5:85126c00 r4:85126c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85126c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabb5e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85161f8c r4:85161c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85126c00 r8:850dc4ac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 dd60: 80230ad0 80239bb0 800f0013 ffffffff r4:e05addc0 r5:00001000 r4:dfd07000 r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r9:83018005 r8:85126000 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 r5:8516238c r4:85162000 r10:61c88647 r9:85126000 r8:850dc5ac r7:82804d40 r6:dddced80 r5:dddceda0 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:265:4188 blocked for more than 457 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:265 state:D stack:0 pid:4188 tgid:4188 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eabbdd84 r8:00000002 r7:60000013 r6:eabbdd8c r5:85125400 r4:85125400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85125400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabbde08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8516278c r4:85162400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:850dc680 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: dd20: 84189000 dfb0b000 00000001 80239b98 7f2f9000 00000001 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 INFO: task kworker/0:266:4190 blocked for more than 457 seconds. r5:84980000 r4:8291a680 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:850dc780 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe05add28 to 0xe05add70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eabc5d84 r8:00000002 r7:60000113 r6:eabc5d8c r5:84980c00 r4:84980c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84980c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabc5e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850d0800 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84980c00 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e053b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85162f8c r4:85162c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85162f8c r4:850dc880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84980c00 r8:850dc8ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:850dc880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850dc880 r8:80287e08 r7:eabc1e60 r6:850dc900 r5:84980c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabc5fb0 to 0xeabc5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850d0340 INFO: task kworker/0:267:4191 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: 846af000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:84981800 r7:00000000 r6:83018000 r5:00001000 r4:7f08b000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:850dc980 r8:80287e08 r7:eabc5e60 r6:850dca00 r5:84981800 task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:269:4196 blocked for more than 457 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:269 state:D stack:0 pid:4196 tgid:4196 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eabcdd84 r8:00000002 r7:60000113 r6:eabcdd8c r5:84982400 r4:84982400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84982400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabcde08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850d0c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84982400 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e06a1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85163b8c r4:85163800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85163b8c r4:850dca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84982400 r8:850dcaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:850dca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850dca80 r8:80287e08 r7:eabc9e60 r6:850dcb00 r5:84982400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabcdfb0 to 0xeabcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850d0780 INFO: task kworker/0:269:4196 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: 84aa5000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r4:00000000 r9:83018005 r8:84983000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xeabd1fb0 to 0xeabd1ff8) task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:84bbbf00 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/0:271:4200 blocked for more than 457 seconds. r5:84983c00 r4:8291a680 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850d0e00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84983c00 r7:00000000 r6:83018000 r5:00001000 r4:7f091000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e06c5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85163f8c r4:85163c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85163f8c r4:850dcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84983c00 r8:850dccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:850dcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850dcc80 r8:80287e08 r7:eabcde60 r6:850dcd00 r5:84983c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabd5fb0 to 0xeabd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850d0a80 INFO: task kworker/0:271:4200 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: 8504c000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xeabd9fb0 to 0xeabd9ff8) Call trace: dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:273:4203 blocked for more than 457 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:273 state:D stack:0 pid:4203 tgid:4203 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eabddd84 r8:00000002 r7:60000113 r6:eabddd8c r5:84985400 r4:84985400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84985400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabdde08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850d0f80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84985400 r7:00000000 r6:83018000 r5:00001000 r4:7f093000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e06eb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8516838c r4:85168000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84985400 r8:850dceac r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 dd60: 80230ad0 80239bb0 800f0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:e88f3000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:84986000 r8:850dcfac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xe05add28 to 0xe05add70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:275:4207 blocked for more than 457 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:275 state:D stack:0 pid:4207 tgid:4207 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eabe9d84 r8:00000002 r7:60000113 r6:eabe9d8c r5:84986c00 r4:84986c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84986c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabe9e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850f30c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84986c00 r7:00000000 r6:83018000 r5:00001000 r4:7f097000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0731000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85168b8c r4:85168800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85168b8c r4:850f1080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84986c00 r8:850f10ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:850f1080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f1080 r8:80287e08 r7:eabe1e60 r6:850f1100 r5:84986c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabe9fb0 to 0xeabe9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850f3000 INFO: task kworker/0:275:4207 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: 857b8000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xe05adfb0 to 0xe05adff8) Not tainted 6.15.0-rc7-syzkaller #0 r4:85138000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabe5e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850f3380 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85138000 r7:00000000 r6:83018000 r5:00001000 r4:7f099000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e075b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85168f8c r4:85168c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85168f8c r4:850f1180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85138000 r8:850f11ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:850f1180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f1180 r8:80287e08 r7:eabe1e60 r6:850f1200 r5:85138000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabe5fb0 to 0xeabe5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850f32c0 INFO: task kworker/0:276:4210 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: 85b99000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 r4:84bbbf00 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/0:277:4211 blocked for more than 457 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:277 state:D stack:0 pid:4211 tgid:4211 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eabf1d84 r8:00000002 r7:60000113 r6:eabf1d8c r5:85138c00 r4:85138c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85138c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabf1e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850f3500 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85138c00 r7:00000000 r6:83018000 r5:00001000 r4:7f09b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e8891000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:8516938c r4:850f1280 r10:00000000 r9:850f1280 r8:80287e08 r7:eabe1e60 r6:850f1300 r5:85138c00 task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:800f0013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced80 r6:83018000 r5:85169f8c r4:850f1380 r4:850f1380 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabf5fb0 to 0xeabf5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850f3540 INFO: task kworker/0:278:4214 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: 8614a000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:279:4216 blocked for more than 457 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eaa09000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:85169b8c r4:850f1480 r10:00000000 r9:850f1480 r8:80287e08 r7:eabf5e60 r6:850f1500 r5:8513a400 INFO: task kworker/0:279:4216 is blocked on a mutex likely owned by task kworker/1:202:3656. dd60: 80230ad0 80239bb0 800f0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:280:4218 blocked for more than 457 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:280 state:D stack:0 pid:4218 tgid:4218 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eabedd84 r8:00000002 r7:60000013 r6:eabedd8c r5:8513bc00 r4:8513bc00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8513bc00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabede08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850f3ac0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8513bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa29000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8516a38c r4:8516a000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8516a38c r4:850f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8513bc00 r8:850f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:850f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f1580 r8:80287e08 r7:eabf5e60 r6:850f1600 r5:8513bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabedfb0 to 0xeabedff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850f39c0 INFO: task kworker/0:280:4218 is blocked on a mutex likely owned by task kworker/1:202:3656. Call trace: r5:800f0013 r4:80239bb0 r5:00001000 r4:dfd07000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Workqueue: events bpf_prog_free_deferred [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:8513c800 r8:850f16ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:850f1680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f1680 r8:80287e08 r7:eabede60 r6:850f1700 r5:8513c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac05fb0 to 0xeac05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850f39c0 INFO: task kworker/0:281:4220 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: 86bbe000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Not tainted 6.15.0-rc7-syzkaller #0 Workqueue: events bpf_prog_free_deferred r5:8513d400 r4:8291a680 [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85106040 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8516af8c r4:8516ac00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8516af8c r4:850f1780 r10:61c88647 r9:8513d400 r8:850f17ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/0:282:4223 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: 86bbe000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:283:4225 blocked for more than 457 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:8513e000 r8:850f18ac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:271:4228 blocked for more than 457 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:271 state:D stack:0 pid:4228 tgid:4228 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaaf9d84 r8:00000002 r7:60000013 r6:eaaf9d8c r5:8513ec00 r4:8513ec00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8513ec00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaaf9e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850f8ac0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8513ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f02b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa57000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8518cf8c r4:8518cc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8518cf8c r4:850e9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8513ec00 r8:850e9e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850e9e00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850e9e00 r8:80287e08 r7:eabb1e60 r6:850f1980 r5:8513ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaaf9fb0 to 0xeaaf9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850f8780 INFO: task kworker/1:271:4228 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: 8701b000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: 87390000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:273:4231 blocked for more than 457 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:273 state:D stack:0 pid:4231 tgid:4231 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eac0dd84 r8:00000002 r7:60000013 r6:eac0dd8c r5:851f0000 r4:851f0000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:851f0000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850f8cc0 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 dd60: 80230ad0 80239bb0 800f0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:284:4232 blocked for more than 457 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:284 state:D stack:0 pid:4232 tgid:4232 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eabfdd84 r8:00000002 r7:60000013 r6:eabfdd8c r5:851f0c00 r4:851f0c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:851f0c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabfde08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850edd80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:851f0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f069000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc4d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:844d4b8c r4:844d4800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:844d4b8c r4:850f1b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851f0c00 r8:850f1b2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:850f1b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f1b00 r8:80287e08 r7:eac09e60 r6:850f1b80 r5:851f0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabfdfb0 to 0xeabfdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85106080 INFO: task kworker/0:284:4232 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: 87390000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:84ba87c0 Workqueue: events bpf_prog_free_deferred r5:851f1800 r4:8291a680 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85106d80 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:850f1c00 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: dd20: 87d77000 dfb0b000 00000001 80239b98 7f2f9000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:274:4236 blocked for more than 457 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:274 state:D stack:0 pid:4236 tgid:4236 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eac19d84 r8:00000002 r7:60000113 r6:eac19d8c r5:851f2400 r4:851f2400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:851f2400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac19e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850f8e00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:851f2400 r7:00000000 r6:83018200 r5:00001000 r4:7f031000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd8b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8518d78c r4:8518d400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8518d78c r4:850e9f80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851f2400 r8:850e9fac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850e9f80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850e9f80 r8:80287e08 r7:eab89e60 r6:850f1d00 r5:851f2400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac19fb0 to 0xeac19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850f8a80 INFO: task kworker/1:274:4236 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: 87d77000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:275:4239 blocked for more than 457 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:275 state:D stack:0 pid:4239 tgid:4239 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eac25d84 r8:00000002 r7:60000113 r6:eac25d8c r5:851f4800 r4:851f4800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:851f4800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac25e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:851f4800 r8:8522802c r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred dd20: 87d77000 dfb0b000 00000001 80239b98 7f2f9000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 Not tainted 6.15.0-rc7-syzkaller #0 r5:85130c00 r4:8291a680 r4:00000000 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:85130c00 r8:852280ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:85228080 r8:80287e08 r7:eac25e60 r6:85228100 r5:85130c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac11fb0 to 0xeac11ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850f8d00 INFO: task kworker/1:276:4241 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: 87d77000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:277:4243 blocked for more than 457 seconds. Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:85132400 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 Exception stack(0xe05adfb0 to 0xe05adff8) INFO: task kworker/1:278:4246 blocked for more than 457 seconds. r5:85133000 r4:8291a680 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac29e08 r9:83018205 r8:85133000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:85228280 r8:80287e08 r7:eac1de60 r6:85228300 r5:85133000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xe05add28 to 0xe05add70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/1:279:4247 blocked for more than 457 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:279 state:D stack:0 pid:4247 tgid:4247 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eac31d84 r8:00000002 r7:60000013 r6:eac31d8c r5:85133c00 r4:85133c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85133c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac31e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85103280 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85133c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00b3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8518eb8c r4:8518e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8518eb8c r4:85228380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85133c00 r8:852283ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85228380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85228380 r8:80287e08 r7:eac29e60 r6:85228400 r5:85133c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac31fb0 to 0xeac31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85103100 INFO: task kworker/1:279:4247 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: 88722000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:280:4249 blocked for more than 457 seconds. Not tainted 6.15.0-rc7-syzkaller #0 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: 88722000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851037c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85135400 r7:00000000 r6:83018200 r5:00001000 r4:7f041000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05e7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8518f78c r4:8518f400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8518f78c r4:85228580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85135400 r8:852285ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85228580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85228580 r8:80287e08 r7:eac35e60 r6:85228600 r5:85135400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac39fb0 to 0xeac39ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85103500 INFO: task kworker/1:281:4251 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: 88ccf000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:dfd07000 r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-rc7-syzkaller #0 r5:85136000 r4:8291a680 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8518ff8c r4:8518fc00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xeac3dfb0 to 0xeac3dff8) task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r4:e05addc0 r5:00001000 r4:dfd07000 r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 Exception stack(0xe05adfb0 to 0xe05adff8) INFO: task kworker/1:283:4254 blocked for more than 457 seconds. r4:85136c00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac41e08 r5:00001000 r4:e0799000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:85228780 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe05add28 to 0xe05add70) dd20: 892a1000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:284:4257 blocked for more than 457 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:284 state:D stack:0 pid:4257 tgid:4257 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eac45d84 r8:00000002 r7:60000113 r6:eac45d8c r5:8508ec00 r4:8508ec00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8508ec00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac45e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85103c40 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8508ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e4859000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:8508ec00 r8:852288ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred dd20: 892a1000 dfb0b000 00000001 80239b98 7f2f9000 00000001 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:851f5400 r4:8291a680 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85103f40 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:85228980 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Call trace: dd20: 892a1000 dfb0b000 00000001 80239b98 7f2f9000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:286:4262 blocked for more than 457 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:286 state:D stack:0 pid:4262 tgid:4262 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eac4dd84 r8:00000002 r7:60000113 r6:eac4dd8c r5:851f6000 r4:851f6000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:851f6000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac4de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850f8300 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:851f6000 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9f7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8519878c r4:85198400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8519878c r4:85228a00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851f6000 r8:85228a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85228a00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85228a00 r8:80287e08 r7:eac2de60 r6:850f1e80 r5:851f6000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac4dfb0 to 0xeac4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85103dc0 INFO: task kworker/1:286:4262 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: 89873000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:851f6c00 r8:85228aac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 dd60: 80230ad0 80239bb0 800f0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:288:4266 blocked for more than 457 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:288 state:D stack:0 pid:4266 tgid:4266 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eac55d84 r8:00000002 r7:60000113 r6:eac55d8c r5:851f3000 r4:851f3000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:851f3000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac55e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850f2100 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:851f3000 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaafd000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85198f8c r4:85198c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85198f8c r4:85228b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851f3000 r8:85228b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85228b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85228b00 r8:80287e08 r7:eac51e60 r6:850f1f80 r5:851f3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac55fb0 to 0xeac55ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85103dc0 INFO: task kworker/1:288:4266 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: 89b67000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 Not tainted 6.15.0-rc7-syzkaller #0 r5:851f3c00 r4:8291a680 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:8516b78c r4:850ec000 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xe05add28 to 0xe05add70) r4:82ac21e4 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/1:289 state:D stack:0 pid:4269 tgid:4269 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac5de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850f2280 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85131800 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab33000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8519938c r4:85199000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8519938c r4:85228b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85131800 r8:85228bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85228b80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85228b80 r8:80287e08 r7:eac55e60 r6:850ec100 r5:85131800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac5dfb0 to 0xeac5dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850f2240 INFO: task kworker/1:289:4269 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: 89db5000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:290:4271 blocked for more than 457 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:290 state:D stack:0 pid:4271 tgid:4271 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eac61d84 r8:00000002 r7:60000113 r6:eac61d8c r5:85130000 r4:85130000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8519978c r4:85199400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8519978c r4:85228c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85130000 r8:85228c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85228c00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85228c00 r8:80287e08 r7:eac5de60 r6:850ec180 r5:85130000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac61fb0 to 0xeac61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850f2040 INFO: task kworker/1:290:4271 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 r4:84bbbf00 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/1:291:4273 blocked for more than 457 seconds. r4:84b10000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac65e08 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xeac65fb0 to 0xeac65ff8) task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r4:e05addc0 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-rc7-syzkaller #0 task:kworker/1:292 state:D stack:0 pid:4274 tgid:4274 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eac69d84 r8:00000002 r7:60000013 r6:eac69d8c r5:84b10c00 r4:84b10c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b10c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac69e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850f2800 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b10c00 r7:00000000 r6:83018200 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab71000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85199f8c r4:85199c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85199f8c r4:85228d00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b10c00 r8:85228d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85228d00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85228d00 r8:80287e08 r7:eac65e60 r6:850ec280 r5:84b10c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac69fb0 to 0xeac69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850f23c0 INFO: task kworker/1:292:4274 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: 8a492000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:293:4276 blocked for more than 457 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:293 state:D stack:0 pid:4276 tgid:4276 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eac49d84 r8:00000002 r7:60000113 r6:eac49d8c r5:84b11800 r4:84b11800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b11800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac49e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850f2a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b11800 r7:00000000 r6:83018200 r5:00001000 r4:7f05f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac79000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8519a78c r4:8519a400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8519a78c r4:85228d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b11800 r8:85228dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85228d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85228d80 r8:80287e08 r7:eac69e60 r6:850ec300 r5:84b11800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac49fb0 to 0xeac49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:84ba87c0 Workqueue: events bpf_prog_free_deferred r4:84b12400 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850f2bc0 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:84b12400 r8:850ec3ac r7:82804d40 r6:dddced80 r5:dddceda0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe05add28 to 0xe05add70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850f2900 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8519a38c r4:8519a000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8519a38c r4:85228e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b13000 r8:85228e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85228e00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85228e00 r8:80287e08 r7:eac49e60 r6:850ec480 r5:84b13000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac89fb0 to 0xeac89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850f2700 INFO: task kworker/1:294:4281 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: 8a794000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:8519af8c r4:8519ac00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8519af8c r4:85228e80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b14800 r8:85228eac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85228e80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85228e80 r8:80287e08 r7:eac49e60 r6:850ec500 r5:84b14800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac8dfb0 to 0xeac8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850f2780 INFO: task kworker/1:295:4283 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: 8aa65000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:84b15400 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac99e08 r5:8471278c r4:84712400 r7:ddde2d80 r6:83018200 r5:8471278c r4:85228f00 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xe05add28 to 0xe05add70) dd20: 8aa65000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:288:4286 blocked for more than 457 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:288 state:D stack:0 pid:4286 tgid:4286 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaca5d84 r8:00000002 r7:60000113 r6:eaca5d8c r5:84b16c00 r4:84b16c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b16c00 r4:8291a680 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaca5e08 r5:8516bf8c r4:8516bc00 r7:dddced80 r6:83018000 r5:8516bf8c r4:850ec600 r10:00000000 r9:850ec600 r8:80287e08 r7:eabfde60 r6:850ec680 r5:84b16c00 Workqueue: events bpf_prog_free_deferred dd60: 80230ad0 80239bb0 800f0013 ffffffff [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:297:4288 blocked for more than 457 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:297 state:D stack:0 pid:4288 tgid:4288 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eacadd84 r8:00000002 r7:60000113 r6:eacadd8c r5:84b16000 r4:84b16000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b16000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacade08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850f2e00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b16000 r7:00000000 r6:83018200 r5:00001000 r4:7f065000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaca1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8519b38c r4:8519b000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84b16000 r8:85228fac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Workqueue: events bpf_prog_free_deferred [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 INFO: task kworker/0:289:4294 blocked for more than 457 seconds. r4:00000000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85208c00 r8:850ec7ac r7:82804d40 r6:dddced80 r5:dddceda0 task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: 8b19d000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xe05adfb0 to 0xe05adff8) r10:8291a684 r9:eac7dd84 r8:00000002 r7:60000013 r6:eac7dd8c r5:85208000 r9:83018005 r8:85208000 r7:00000000 r6:83018000 r5:00001000 r4:7f06f000 r7:dddced80 r6:83018000 r5:85268b8c r4:850ec880 r4:850edc80 r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:291:4297 blocked for more than 457 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:291 state:D stack:0 pid:4297 tgid:4297 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eac75d84 r8:00000002 r7:60000013 r6:eac75d8c r5:8520a400 r4:8520a400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8520a400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac75e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850ed800 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8520a400 r7:00000000 r6:83018000 r5:00001000 r4:7f06d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe81000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526878c r4:85268400 r7:dddced80 r6:83018000 r5:8526878c r4:850ec980 r10:00000000 r9:850ec980 r8:80287e08 r7:eac7de60 r6:850eca00 r5:8520a400 r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:8520b000 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850fa100 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8520b000 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffad000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526938c r4:85269000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8526938c r4:850eca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8520b000 r8:850ecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:850eca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850eca80 r8:80287e08 r7:eac7de60 r6:850ecb00 r5:8520b000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 dd60: 80230ad0 80239bb0 800f0013 ffffffff [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:85268f8c r4:85268c00 r4:00000001 r4:850fa040 Exception stack(0xe05add28 to 0xe05add70) r4:00000000 r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:294:4303 blocked for more than 457 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:294 state:D stack:0 pid:4303 tgid:4303 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eacc9d84 r8:00000002 r7:60000113 r6:eacc9d8c r5:8520c800 r4:8520c800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8520c800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacc9e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850fa300 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8520c800 r7:00000000 r6:83018000 r5:00001000 r4:7f075000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e044f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8526978c r4:85269400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaccde08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850fa4c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8520d400 r7:00000000 r6:83018000 r5:00001000 r4:7f077000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e047f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85269b8c r4:85269800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85269b8c r4:850ecd80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8520d400 r8:850ecdac r7:82804d40 r6:dddced80 r5:dddceda0 r4:850ecd80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850ecd80 r8:80287e08 r7:eacc9e60 r6:850ece00 r5:8520d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaccdfb0 to 0xeaccdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850fa180 INFO: task kworker/0:295:4306 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) dd60: 80230ad0 80239bb0 800f0013 ffffffff [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:85269f8c r4:85269c00 Exception stack(0xeacbdfb0 to 0xeacbdff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850fa340 INFO: task kworker/0:296:4307 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: 8c559000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Call trace: r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacd1e08 r5:8526a78c r4:8526a400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:850ecf80 r8:80287e08 r7:eacbde60 r6:850f5000 r5:8520ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeacd1fb0 to 0xeacd1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850fa440 INFO: task kworker/0:297:4309 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: 8c559000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:8519b78c r4:8519b400 r7:ddde2d80 r6:83018200 r5:8519b78c r4:850e8000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 dd60: 80230ad0 80239bb0 800f0013 ffffffff [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) dfa0: 00000000 00000000 00000000 00000000 r4:82ac21e4 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:299:4314 blocked for more than 458 seconds. Not tainted 6.15.0-rc7-syzkaller #0 task:kworker/0:299 state:D stack:0 pid:4314 tgid:4314 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:8526bb8c r4:8526b800 r7:dddced80 r6:83018000 r5:8526bb8c r4:850f5180 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:00001000 r4:dfd07000 r4:00000001 INFO: task kworker/0:300:4316 blocked for more than 458 seconds. [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05eb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526ab8c r4:8526a800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8526ab8c r4:850f5200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851cc800 r8:850f522c r7:82804d40 r6:dddced80 r5:dddceda0 r4:850f5200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5200 r8:80287e08 r7:eace9e60 r6:850e8180 r5:851cc800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeacf1fb0 to 0xeacf1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850faa80 INFO: task kworker/0:300:4316 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe05add28 to 0xe05add70) dd20: 8cd19000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r10:8291a684 r9:eacf5d84 r8:00000002 r7:60000113 r6:eacf5d8c r5:851ca400 r9:83018005 r8:851ca400 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 r7:dddced80 r6:83018000 r5:8526af8c r4:850f5280 r10:61c88647 r9:851ca400 r8:850f52ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:850f5280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5280 r8:80287e08 r7:eace9e60 r6:850e8200 r5:851ca400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeacf5fb0 to 0xeacf5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850fa8c0 INFO: task kworker/0:301:4317 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: 8d0f7000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) INFO: task kworker/0:302:4319 blocked for more than 458 seconds. [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:851ce000 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 r5:8526b38c r4:8526b000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:850f5300 r8:80287e08 r7:eace9e60 r6:850e8280 r5:851ce000 task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: 8d0f7000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:00000000 r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84ba87c0 r10:8291a684 r9:ead05d84 r8:00000002 r7:60000113 r6:ead05d8c r5:851c8000 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:8526b78c r4:8526b400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r4:82ac21e4 r4:00000000 r5:84be078c r4:84be0400 r4:00000001 INFO: task kworker/0:304:4323 blocked for more than 458 seconds. r4:851c8c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:851c8c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead0de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85234440 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:851c8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa21000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85274b8c r4:85274800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85274b8c r4:850f5400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851c8c00 r8:850f542c r7:82804d40 r6:dddced80 r5:dddceda0 r4:850f5400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5400 r8:80287e08 r7:eace9e60 r6:850e8380 r5:851c8c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead0dfb0 to 0xead0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850f2f80 INFO: task kworker/0:304:4323 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: 8d667000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:851cec00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead15e08 r5:00001000 r4:e4867000 r5:8526bf8c r4:8526bc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8526bf8c r4:850f5480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851cec00 r8:850f54ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:850f5480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5480 r8:80287e08 r7:ead0de60 r6:850e8400 r5:851cec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead15fb0 to 0xead15ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850fae80 INFO: task kworker/0:305:4325 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:84be078c r4:84be0400 Exception stack(0xe05adfb0 to 0xe05adff8) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r4:851c9800 r4:00000000 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:8527438c r4:850f5500 r10:00000000 r9:850f5500 r8:80287e08 r7:ead0de60 r6:850e8480 r5:851c9800 task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eacd5d84 r8:00000002 r7:60000113 r6:eacd5d8c r5:84b13c00 r4:84b13c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b13c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacd5e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85234340 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84b13c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa0f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8527478c r4:85274400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8527478c r4:850f5580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b13c00 r8:850f55ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:850f5580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5580 r8:80287e08 r7:ead0de60 r6:850f5600 r5:84b13c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeacd5fb0 to 0xeacd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85234000 INFO: task kworker/0:307:4329 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: 8df15000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:84bbbf00 Exception stack(0xe05adfb0 to 0xe05adff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r5:849d8000 r4:8291a680 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:85274f8c r4:85274c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:849d8000 r8:850f56ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:850f5680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5680 r8:80287e08 r7:ead0de60 r6:850f5700 r5:849d8000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead21fb0 to 0xead21ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85234380 INFO: task kworker/0:308:4331 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: 8e3bc000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:8527578c r4:85275400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:849d8c00 r8:850f57ac r7:82804d40 r6:dddced80 r5:dddceda0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:310:4336 blocked for more than 458 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:310 state:D stack:0 pid:4336 tgid:4336 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ead2dd84 r8:00000002 r7:60000113 r6:ead2dd8c r5:849d9800 r4:849d9800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:849d9800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85234700 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:849d9800 r7:00000000 r6:83018000 r5:00001000 r4:7f093000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa49000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8527538c r4:85275000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8527538c r4:850f5880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:849d9800 r8:850f58ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:850f5880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5880 r8:80287e08 r7:ead25e60 r6:850f5900 r5:849d9800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead2dfb0 to 0xead2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852343c0 INFO: task kworker/0:310:4336 is blocked on a mutex likely owned by task kworker/1:202:3656. r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r5:84be078c r4:84be0400 r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r5:849db000 r4:8291a680 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:8527638c r4:85276000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:850f5980 Exception stack(0xeace1fb0 to 0xeace1ff8) task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:312:4340 blocked for more than 458 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:312 state:D stack:0 pid:4340 tgid:4340 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ead35d84 r8:00000002 r7:60000013 r6:ead35d8c r5:849dbc00 r4:849dbc00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:849dbc00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead35e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:85275b8c r4:85275800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:849dbc00 r8:850f5aac r7:82804d40 r6:dddced80 r5:dddceda0 r4:850f5a80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5a80 r8:80287e08 r7:eace1e60 r6:850f5b00 r5:849dbc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead35fb0 to 0xead35ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85234880 INFO: task kworker/0:312:4340 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: 8ec87000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r5:849dc800 r4:8291a680 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:85275f8c r4:85275c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:850f5b80 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 task:kworker/1:299 state:D stack:0 pid:4343 tgid:4343 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r4:00000000 r5:8519bb8c r4:8519b800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:851d0000 r8:850e852c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850fdd00 INFO: task kworker/1:299:4343 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: 8f277000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 INFO: task kworker/0:314:4346 blocked for more than 458 seconds. r10:8291a684 r9:ead61d84 r8:00000002 r7:60000113 r6:ead61d8c r5:851d1800 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:8527678c r4:85276400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8527678c r4:850f5c80 r10:61c88647 r9:851d1800 r8:850f5cac r7:82804d40 r6:dddced80 r5:dddceda0 r4:850f5c80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5c80 r8:80287e08 r7:eace1e60 r6:850e8600 r5:851d1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead61fb0 to 0xead61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85234d00 INFO: task kworker/0:314:4346 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: 8f277000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:315:4348 blocked for more than 458 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:315 state:D stack:0 pid:4348 tgid:4348 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ead6dd84 r8:00000002 r7:60000113 r6:ead6dd8c r5:851d2400 r4:851d2400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead6de08 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85276b8c r4:85276800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 INFO: task kworker/0:316:4351 blocked for more than 458 seconds. r4:849dd400 r4:00000000 r9:83018005 r8:849dd400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a7000 r7:dddced80 r6:83018000 r5:8527778c r4:850f5d80 r4:00000001 task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:317:4352 blocked for more than 458 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:317 state:D stack:0 pid:4352 tgid:4352 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ead85d84 r8:00000002 r7:60000113 r6:ead85d8c r5:849de000 r4:849de000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:849de000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead85e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85244280 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:849de000 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead7b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85276f8c r4:85276c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85276f8c r4:850f5e80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:849de000 r8:850f5eac r7:82804d40 r6:dddced80 r5:dddceda0 r4:850f5e80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5e80 r8:80287e08 r7:ead4de60 r6:850f5f00 r5:849de000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred dd60: 80230ad0 80239bb0 800f0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 Exception stack(0xe05adfb0 to 0xe05adff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Call trace: [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:8527738c r4:85277000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8527738c r4:850f5f80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:849dec00 r8:850f5fac r7:82804d40 r6:dddced80 r5:dddceda0 r4:850f5f80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5f80 r8:80287e08 r7:ead4de60 r6:85243000 r5:849dec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead79fb0 to 0xead79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852442c0 INFO: task kworker/0:318:4354 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: 8ffcd000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:319:4356 blocked for more than 458 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:319 state:D stack:0 pid:4356 tgid:4356 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r5:849da400 r4:8291a680 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:85277b8c r4:85277800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:849da400 r8:852430ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:852444c0 r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:82ac21e4 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:84be078c r4:84be0400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:8527c38c r4:85243180 Exception stack(0xeada1fb0 to 0xeada1ff8) r4:85244600 Call trace: Exception stack(0xe05add28 to 0xe05add70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:321:4359 blocked for more than 458 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:321 state:D stack:0 pid:4359 tgid:4359 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eadb1d84 r8:00000002 r7:60000113 r6:eadb1d8c r5:85210c00 r4:85210c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85210c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadb1e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85244a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85210c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0ad000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85277f8c r4:85277c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85277f8c r4:85243280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85210c00 r8:852432ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85243280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85243280 r8:80287e08 r7:eada1e60 r6:85243300 r5:85210c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeadb1fb0 to 0xeadb1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85244600 INFO: task kworker/0:321:4359 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: 905ab000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85211800 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadade08 r9:83018005 r8:85211800 r7:00000000 r6:83018000 r5:00001000 r4:7f0b1000 r5:8527c78c r4:8527c400 r10:61c88647 r9:85211800 r8:852433ac r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r5:84be078c r4:84be0400 r4:84bbbf00 Exception stack(0xe05adfb0 to 0xe05adff8) INFO: task kworker/0:323:4363 blocked for more than 458 seconds. r10:8291a684 r9:eadbdd84 r8:00000002 r7:60000113 r6:eadbdd8c r5:85212400 r4:85212400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85212400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadbde08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85244e40 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85212400 r7:00000000 r6:83018000 r5:00001000 r4:7f0b3000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eade7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8527cb8c r4:8527c800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8527cb8c r4:85243480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85212400 r8:852434ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85243480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85243480 r8:80287e08 r7:eadade60 r6:85243500 r5:85212400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeadbdfb0 to 0xeadbdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852449c0 INFO: task kworker/0:323:4363 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: 90b7e000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84bbbf00 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:8527cf8c r4:8527cc00 r10:00000000 r9:85243580 r8:80287e08 r7:eadbde60 r6:85243600 r5:85213000 r4:00000000 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:325:4368 blocked for more than 458 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:85213c00 r8:852436ac r7:82804d40 r6:dddced80 r5:dddceda0 Workqueue: events bpf_prog_free_deferred r4:82ac21e4 r4:00000000 r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 task:kworker/0:326 state:D stack:0 pid:4370 tgid:4370 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:8527df8c r4:8527dc00 r7:dddced80 r6:83018000 r5:8527df8c r4:85243780 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:327:4372 blocked for more than 458 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:327 state:D stack:0 pid:4372 tgid:4372 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eae0dd84 r8:00000002 r7:60000113 r6:eae0dd8c r5:85215400 r4:85215400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85215400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae0de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85254280 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85215400 r7:00000000 r6:83018000 r5:00001000 r4:7f0b9000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae0f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8527d78c r4:8527d400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8527d78c r4:85243880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85215400 r8:852438ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85243880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85243880 r8:80287e08 r7:eadfde60 r6:85243900 r5:85215400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:851d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f02b000 r10:61c88647 r9:851d3000 r8:850e872c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85253600 Workqueue: events bpf_prog_free_deferred Exception stack(0xe05add28 to 0xe05add70) dd20: 919bd000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:301:4379 blocked for more than 458 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:301 state:D stack:0 pid:4379 tgid:4379 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eae21d84 r8:00000002 r7:60000113 r6:eae21d8c r5:851d3c00 r4:851d3c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:851d3c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae21e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85253b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:851d3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f031000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdf7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851a078c r4:851a0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851a078c r4:850e8800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851d3c00 r8:850e882c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850e8800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850e8800 r8:80287e08 r7:eac99e60 r6:850e8880 r5:851d3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae21fb0 to 0xeae21ff8) 1fa0: 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 dd60: 80230ad0 80239bb0 800f0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:302:4381 blocked for more than 458 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:302 state:D stack:0 pid:4381 tgid:4381 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eae39d84 r8:00000002 r7:60000013 r6:eae39d8c r5:85216000 r4:85216000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85216000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae39e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85253a40 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85216000 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfda5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851a038c r4:851a0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851a038c r4:850e8900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85216000 r8:850e892c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850e8900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850e8900 r8:80287e08 r7:eae21e60 r6:85243980 r5:85216000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae39fb0 to 0xeae39ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85253980 INFO: task kworker/1:302:4381 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: 91e55000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 Not tainted 6.15.0-rc7-syzkaller #0 Workqueue: events bpf_prog_free_deferred [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r9:83018005 r8:85218c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0c5000 r5:8527eb8c r4:8527e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85218c00 r8:85243a2c r7:82804d40 r6:dddced80 r5:dddceda0 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe05add28 to 0xe05add70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r5:00001000 r4:dfd07000 r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:303:4384 blocked for more than 458 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:303 state:D stack:0 pid:4384 tgid:4384 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eae51d84 r8:00000002 r7:60000113 r6:eae51d8c r5:8521a400 r4:8521a400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8521a400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae51e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85253a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8521a400 r7:00000000 r6:83018200 r5:00001000 r4:7f033000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe43000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851a0b8c r4:851a0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851a0b8c r4:850e8980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8521a400 r8:850e89ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850e8980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850e8980 r8:80287e08 r7:eae21e60 r6:85243b00 r5:8521a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae51fb0 to 0xeae51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85253a00 INFO: task kworker/1:303:4384 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: 92150000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:304:4386 blocked for more than 458 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:304 state:D stack:0 pid:4386 tgid:4386 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eae61d84 r8:00000002 r7:60000113 r6:eae61d8c r5:8521b000 r4:8521b000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8521b000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae61e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8524f440 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8521b000 r7:00000000 r6:83018200 r5:00001000 r4:7f041000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea901000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851a278c r4:851a2400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851a278c r4:850e8a00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8521b000 r8:850e8a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850e8a00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850e8a00 r8:80287e08 r7:eae51e60 r6:85243b80 r5:8521b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae61fb0 to 0xeae61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85253b00 INFO: task kworker/1:304:4386 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: 9250a000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:305:4387 blocked for more than 458 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:305 state:D stack:0 pid:4387 tgid:4387 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eae65d84 r8:00000002 r7:60000113 r6:eae65d8c r5:85219800 r4:85219800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85219800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae65e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85253e40 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85219800 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e007f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851a0f8c r4:851a0c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851a0f8c r4:850e8a80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85219800 r8:850e8aac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850e8a80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850e8a80 r8:80287e08 r7:eae61e60 r6:85243c00 r5:85219800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae65fb0 to 0xeae65ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85253b00 INFO: task kworker/1:305:4387 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: 92773000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:306:4389 blocked for more than 458 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:306 state:D stack:0 pid:4389 tgid:4389 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eae75d84 r8:00000002 r7:60000013 r6:eae75d8c r5:85218000 r4:85218000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85218000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae75e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85253fc0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85218000 r7:00000000 r6:83018200 r5:00001000 r4:7f037000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00db000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851a138c r4:851a1000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851a138c r4:850e8b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85218000 r8:850e8b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850e8b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850e8b00 r8:80287e08 r7:eae61e60 r6:85243c80 r5:85218000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae75fb0 to 0xeae75ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85253c80 INFO: task kworker/1:306:4389 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: 92adf000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Not tainted 6.15.0-rc7-syzkaller #0 Workqueue: events bpf_prog_free_deferred r10:8291a684 r9:eae89d84 r8:00000002 r7:60000113 r6:eae89d8c r5:8521bc00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae89e08 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r9:83018205 r8:8521bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0117000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851a178c r4:851a1400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851a178c r4:850e8b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8521bc00 r8:850e8bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850e8b80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850e8b80 r8:80287e08 r7:eae61e60 r6:85243d00 r5:8521bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85253e00 INFO: task kworker/1:307:4391 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: 92adf000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:308:4393 blocked for more than 458 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:308 state:D stack:0 pid:4393 tgid:4393 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r4:00000000 r9:83018205 r8:8521c800 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 r5:851a1b8c r4:851a1800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851a1b8c r4:850e8c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8521c800 r8:850e8c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850e8c00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850e8c00 r8:80287e08 r7:eae61e60 r6:85243d80 r5:8521c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae91fb0 to 0xeae91ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85253480 INFO: task kworker/1:308:4393 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: 9313c000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 r5:84be078c r4:84be0400 r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 Exception stack(0xe05adfb0 to 0xe05adff8) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r4:8521ec00 r5:8521ec00 r4:8291a680 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaea5e08 r4:00000000 r9:83018205 r8:8521ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 r5:851a1f8c r4:851a1c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851a1f8c r4:850e8c80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:850e8c80 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 Exception stack(0xe05add28 to 0xe05add70) dd60: 80230ad0 80239bb0 800f0013 ffffffff r4:82ac21e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:310:4397 blocked for more than 458 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:310 state:D stack:0 pid:4397 tgid:4397 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eade5d84 r8:00000002 r7:60000113 r6:eade5d8c r5:851d5400 r4:851d5400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:851d5400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eade5e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8524f2c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:851d5400 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e4857000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851a238c r4:851a2000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851a238c r4:850e8d00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851d5400 r8:850e8d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850e8d00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850e8d00 r8:80287e08 r7:eae61e60 r6:850e8d80 r5:851d5400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeade5fb0 to 0xeade5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8524f200 INFO: task kworker/1:310:4397 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: 93519000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:e05addc0 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:84ba87c0 Workqueue: events bpf_prog_free_deferred r4:851d6000 [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8524f740 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:851d6000 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaabf000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851a2f8c r4:851a2c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851a2f8c r4:850e8e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851d6000 r8:850e8e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850e8e00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850e8e00 r8:80287e08 r7:eae61e60 r6:850e8e80 r5:851d6000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaea9fb0 to 0xeaea9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8524f240 INFO: task kworker/1:311:4400 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: 93ace000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:312:4401 blocked for more than 458 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:312 state:D stack:0 pid:4401 tgid:4401 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaeb5d84 r8:00000002 r7:60000013 r6:eaeb5d8c r5:8521e000 [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:8521e000 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 r5:851a2b8c r4:851a2800 r4:850e8f00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850e8f00 r8:80287e08 r7:eaea9e60 r6:85243e80 r5:8521e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8524f240 INFO: task kworker/1:312:4401 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: 93d33000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaebdd84 r8:00000002 r7:60000013 r6:eaebdd8c r5:85216c00 r4:85216c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85216c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaebde08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8524f900 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85216c00 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab27000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851a338c r4:851a3000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851a338c r4:850e8f80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85216c00 r8:850e8fac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850e8f80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850e8f80 r8:80287e08 r7:eaea9e60 r6:85243f00 r5:85216c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaebdfb0 to 0xeaebdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8524f5c0 INFO: task kworker/1:313:4404 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:82ac21e4 r4:e05addc0 r5:00001000 r4:dfd07000 r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 Not tainted 6.15.0-rc7-syzkaller #0 r4:84a90c00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaec5e08 r9:83018205 r8:84a90c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab49000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851a3b8c r4:851a3800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851a3b8c r4:85242000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90c00 r8:8524202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85242000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85242000 r8:80287e08 r7:eaebde60 r6:85243f80 r5:84a90c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec5fb0 to 0xeaec5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8524f640 INFO: task kworker/1:314:4406 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) dd60: 80230ad0 80239bb0 800f0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 Exception stack(0xe05adfb0 to 0xe05adff8) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:851d4800 r7:00000000 r6:83018200 r5:00001000 r4:7f049000 r5:851a378c r4:851a3400 r10:61c88647 r9:851d4800 r8:852420ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 dd60: 80230ad0 80239bb0 800f0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:316:4410 blocked for more than 459 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:316 state:D stack:0 pid:4410 tgid:4410 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaec1d84 r8:00000002 r7:60000113 r6:eaec1d8c r5:851d0c00 r4:851d0c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:851d0c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaec1e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8524fc80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:851d0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab65000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851a3f8c r4:851a3c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851a3f8c r4:85242180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851d0c00 r8:852421ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85242180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85242180 r8:80287e08 r7:eaec5e60 r6:85242200 r5:851d0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec1fb0 to 0xeaec1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8524fbc0 INFO: task kworker/1:316:4410 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: 94d31000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r4:82ac21e4 r4:00000000 r5:84be078c r4:84be0400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:8521d400 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 r5:851ac78c r4:851ac400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:8521d400 r8:852422ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 r4:e05addc0 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:318:4413 blocked for more than 459 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:318 state:D stack:0 pid:4413 tgid:4413 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaecdd84 r8:00000002 r7:60000013 r6:eaecdd8c r5:851cd400 r4:851cd400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:851cd400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaecde08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8524fec0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:851cd400 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab7b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851ac38c r4:851ac000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851ac38c r4:85242380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851cd400 r8:852423ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85242380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85242380 r8:80287e08 r7:eae3de60 r6:85242400 r5:851cd400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaecdfb0 to 0xeaecdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8524fdc0 INFO: task kworker/1:318:4413 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: 953a6000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:329:4414 blocked for more than 459 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:329 state:D stack:0 pid:4414 tgid:4414 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaed1d84 r8:00000002 r7:60000113 r6:eaed1d8c r5:8508bc00 r4:8508bc00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8508bc00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r5:00001000 r4:eae6b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8527e38c r4:8527e000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8527e38c r4:85239000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8508bc00 r8:8523902c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85239000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85239000 r8:80287e08 r7:eae31e60 r6:85242480 r5:8508bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaed1fb0 to 0xeaed1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85234f80 INFO: task kworker/0:329:4414 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) dd60: 80230ad0 80239bb0 800f0013 ffffffff r4:e05addc0 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:84ba87c0 task:kworker/1:319 state:D stack:0 pid:4417 tgid:4417 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaed5e08 r5:00001000 r4:eac77000 r5:851acb8c r4:851ac800 r10:61c88647 r9:851d8000 r8:8524252c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85242500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85242500 r8:80287e08 r7:eae3de60 r6:85239080 r5:851d8000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaed5fb0 to 0xeaed5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8524f940 INFO: task kworker/1:319:4417 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: 958ad000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:320:4419 blocked for more than 459 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:320 state:D stack:0 pid:4419 tgid:4419 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaed9d84 r8:00000002 r7:60000013 r6:eaed9d8c r5:84a91800 r4:84a91800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a91800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaed9e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8523b340 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a91800 r7:00000000 r6:83018200 r5:00001000 r4:7f055000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac8f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851acf8c r4:851acc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851acf8c r4:85242580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a91800 r8:852425ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85242580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85242580 r8:80287e08 r7:eaed5e60 r6:85239100 r5:84a91800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaed9fb0 to 0xeaed9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8523b100 INFO: task kworker/1:320:4419 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: 958ad000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 INFO: task kworker/1:321:4421 blocked for more than 459 seconds. r10:8291a684 r9:eaeddd84 r8:00000002 r7:60000013 r6:eaeddd8c r5:84a92400 [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:00001000 r4:eac9d000 r5:851ad38c r4:851ad000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851ad38c r4:85242600 r4:85242600 Exception stack(0xeaeddfb0 to 0xeaeddff8) r4:8523b200 Workqueue: events bpf_prog_free_deferred r4:00000000 dd20: 95a9b000 dfb0b000 00000001 80239b98 7f2f9000 00000001 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r5:84be078c r4:84be0400 r4:84bbbf00 r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:322:4423 blocked for more than 459 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:322 state:D stack:0 pid:4423 tgid:4423 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaee5d84 r8:00000002 r7:60000113 r6:eaee5d8c r5:84a93c00 r4:84a93c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a93c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaee5e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8523b580 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a93c00 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eacb3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851ad78c r4:851ad400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851ad78c r4:85242680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a93c00 r8:852426ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85242680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85242680 r8:80287e08 r7:eaedde60 r6:85239200 r5:84a93c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaee5fb0 to 0xeaee5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8523b2c0 INFO: task kworker/1:322:4423 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: 95e3a000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:323:4425 blocked for more than 459 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:323 state:D stack:0 pid:4425 tgid:4425 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaec9d84 r8:00000002 r7:60000013 r6:eaec9d8c r5:851d9800 r4:851d9800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:851d9800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaec9e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8523b7c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:851d9800 r7:00000000 r6:83018200 r5:00001000 r4:7f05d000 r5:851adb8c r4:851ad800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:851d9800 r8:8524272c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: 95e3a000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:324:4428 blocked for more than 459 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:324 state:D stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaef5d84 r8:00000002 r7:60000113 r6:eaef5d8c r5:851dbc00 r4:851dbc00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:851dbc00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaef5e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85241140 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:851dbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f0bd000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851aef8c r4:851aec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851aef8c r4:85242800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:85242800 Exception stack(0xeaef5fb0 to 0xeaef5ff8) r4:8523b640 Workqueue: events bpf_prog_free_deferred Exception stack(0xe05add28 to 0xe05add70) dd60: 80230ad0 80239bb0 800f0013 ffffffff r4:e05addc0 r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 r5:84be078c r4:84be0400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-rc7-syzkaller #0 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaef9e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85235740 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:851da400 r7:00000000 r6:83018000 r5:00001000 r4:7f0c1000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf43000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8527e78c r4:8527e400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8527e78c r4:85239280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851da400 r8:852392ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85239280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85239280 r8:80287e08 r7:eae31e60 r6:85242900 r5:851da400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaef9fb0 to 0xeaef9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85235280 INFO: task kworker/0:330:4429 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: 962cf000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:325:4430 blocked for more than 459 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r4:851dc800 r5:851dc800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaefde08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8523bbc0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:851dc800 r7:00000000 r6:83018200 r5:00001000 r4:7f05f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaeff000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851adf8c r4:851adc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851adf8c r4:85242980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851dc800 r8:852429ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85242980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85242980 r8:80287e08 r7:eaef5e60 r6:85242a00 r5:851dc800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaefdfb0 to 0xeaefdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8523b8c0 INFO: task kworker/1:325:4430 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: 969e0000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/1:326:4433 blocked for more than 459 seconds. Workqueue: events bpf_prog_free_deferred r4:851dd400 [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8523bcc0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:851dd400 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851ae38c r4:851ae000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851ae38c r4:85242a80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851dd400 r8:85242aac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85242a80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85242a80 r8:80287e08 r7:eaef5e60 r6:85242b00 r5:851dd400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf11fb0 to 0xeaf11ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8523b6c0 INFO: task kworker/1:326:4433 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: 969e0000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:84ba87c0 task:kworker/1:327 state:D stack:0 pid:4435 tgid:4435 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaee1e08 r5:00001000 r4:eaf13000 r5:851ae78c r4:851ae400 r10:61c88647 r9:851de000 r8:85242c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 dd60: 80230ad0 80239bb0 800f0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:328 state:D stack:0 pid:4437 tgid:4437 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaee9d84 r8:00000002 r7:60000113 r6:eaee9d8c r5:851dec00 r4:851dec00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:851dec00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaee9e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8523bfc0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:851dec00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a9000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf1f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851aeb8c r4:851ae800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851aeb8c r4:85242b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851dec00 r8:85242bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85242b80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85242b80 r8:80287e08 r7:eaef5e60 r6:85242d00 r5:851dec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaee9fb0 to 0xeaee9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8523bdc0 INFO: task kworker/1:328:4437 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: 9710b000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:84be078c r4:84be0400 r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:84ba87c0 task:kworker/1:329 state:D stack:0 pid:4438 tgid:4438 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:851af38c r4:85242d80 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:330:4440 blocked for more than 459 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:330 state:D stack:0 pid:4440 tgid:4440 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaf39d84 r8:00000002 r7:60000013 r6:eaf39d8c r5:851d6c00 r4:851d6c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:851d6c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf39e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85241840 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:851d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0c7000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf67000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851afb8c r4:851af800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851afb8c r4:85242e80 r4:85242e80 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:851e0c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf4de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85241540 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:851e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0c3000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf4f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851af78c r4:851af400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851af78c r4:85242f80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851e0c00 r8:85242fac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85242f80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85242f80 r8:80287e08 r7:eaf39e60 r6:85237000 r5:851e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf4dfb0 to 0xeaf4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85241480 INFO: task kworker/1:331:4443 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: 976a5000 dfb0b000 00000001 80239b98 7f2f9000 00000001 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:331:4446 blocked for more than 459 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:331 state:D stack:0 pid:4446 tgid:4446 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaf65d84 r8:00000002 r7:60000113 r6:eaf65d8c r5:851e0000 r4:851e0000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:851e0000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf65e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85235540 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:851e0000 r7:00000000 r6:83018000 r5:00001000 r4:7f069000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfcad000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:844d4f8c r4:844d4c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:851e0000 r8:8523932c r7:82804d40 r6:dddced80 r5:dddceda0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r5:84be078c r4:84be0400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:851e2400 r4:8291a680 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8527ef8c r4:8527ec00 r10:61c88647 r9:851e2400 r8:8523712c r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf89e08 r9:83018205 r8:851e3000 r7:00000000 r6:83018200 r5:00001000 r4:7f0c9000 r5:851aff8c r4:851afc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851aff8c r4:85237200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851e3000 r8:8523722c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85237200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85237200 r8:80287e08 r7:eaf75e60 r6:85237280 r5:851e3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf89fb0 to 0xeaf89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85241800 INFO: task kworker/1:333:4450 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: 97a11000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:332:4451 blocked for more than 459 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:332 state:D stack:0 pid:4451 tgid:4451 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaf8dd84 r8:00000002 r7:60000113 r6:eaf8dd8c r5:851e4800 r4:851e4800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:851e4800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf8de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85235b00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:851e4800 r7:00000000 r6:83018000 r5:00001000 r4:7f0cf000 r5:8527f38c r4:8527f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:85239380 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 dd60: 80230ad0 80239bb0 800f0013 ffffffff r4:e05addc0 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:334:4452 blocked for more than 459 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:334 state:D stack:0 pid:4452 tgid:4452 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaf91d84 r8:00000002 r7:60000113 r6:eaf91d8c r5:851e5400 r4:851e5400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:851e5400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf91e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d3e80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:851e5400 r7:00000000 r6:83018200 r5:00001000 r4:7f073000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0693000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852a5f8c r4:852a5c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:852a5f8c r4:85237300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851e5400 r8:8523732c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85237300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85237300 r8:80287e08 r7:eaf75e60 r6:85237400 r5:851e5400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf91fb0 to 0xeaf91ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85241b40 INFO: task kworker/1:334:4452 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: 980a7000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 Not tainted 6.15.0-rc7-syzkaller #0 r4:851e1800 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf9de08 r9:83018205 r8:851e1800 r7:00000000 r6:83018200 r5:00001000 r4:7f0cd000 r5:852a438c r4:852a4000 r7:ddde2d80 r6:83018200 r5:852a438c r4:85237480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851e1800 r8:852374ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85237480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85237480 r8:80287e08 r7:eaf91e60 r6:85237500 r5:851e1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf9dfb0 to 0xeaf9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85241e00 INFO: task kworker/1:335:4454 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: 98320000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:336:4456 blocked for more than 459 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r4:851e3c00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafa9e08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852a5b8c r4:852a5800 r7:ddde2d80 r6:83018200 r5:852a5b8c r4:85237580 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeafa9fb0 to 0xeafa9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85241800 INFO: task kworker/1:336:4456 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: 98320000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 INFO: task kworker/0:333:4457 blocked for more than 459 seconds. r4:851d8c00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafade08 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8527f78c r4:8527f400 r10:61c88647 r9:851d8c00 r8:8523942c r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: 983df000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:84be078c r4:84be0400 Exception stack(0xe05adfb0 to 0xe05adff8) Call trace: [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:df9fb000 r5:8527fb8c r4:8527f800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8527fb8c r4:85239480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851e8000 r8:852394ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85239480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85239480 r8:80287e08 r7:eaf65e60 r6:85237700 r5:851e8000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeafc1fb0 to 0xeafc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85235ac0 INFO: task kworker/0:334:4459 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: 98750000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:335:4464 blocked for more than 459 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:335 state:D stack:0 pid:4464 tgid:4464 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ead9dd84 r8:00000002 r7:60000113 r6:ead9dd8c r5:851e9800 r4:851e9800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:851e9800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead9de08 r4:00000000 r5:8527ff8c r4:8527fc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:851e9800 r8:8523952c r7:82804d40 r6:dddced80 r5:dddceda0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:82ac21e4 r4:00000000 r5:84be078c r4:84be0400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:84ba87c0 task:kworker/0:336 state:D stack:0 pid:4468 tgid:4468 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8478f180 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:851e8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f06b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe69000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8528c38c r4:8528c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8528c38c r4:85239580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851e8c00 r8:852395ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85239580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85239580 r8:80287e08 r7:eaf65e60 r6:85237800 r5:851e8c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeade1fb0 to 0xeade1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8478f0c0 INFO: task kworker/0:336:4468 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: 989fc000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:851ea400 r7:00000000 r6:83018000 r5:00001000 r4:7f06f000 r5:8528cb8c r4:8528c800 r10:61c88647 r9:851ea400 r8:8523962c r7:82804d40 r6:dddced80 r5:dddceda0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 r4:00000000 r5:00001000 r4:dfd07000 r4:84bbbf00 Exception stack(0xe05adfb0 to 0xe05adff8) INFO: task kworker/0:338:4471 blocked for more than 459 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:338 state:D stack:0 pid:4471 tgid:4471 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eae15d84 r8:00000002 r7:60000013 r6:eae15d8c r5:851eb000 r4:851eb000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:851eb000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae15e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85241e00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:851eb000 r7:00000000 r6:83018000 r5:00001000 r4:7f06d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff19000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8528c78c r4:8528c400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8528c78c r4:85239680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851eb000 r8:852396ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85239680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85239680 r8:80287e08 r7:eadede60 r6:85237900 r5:851eb000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae15fb0 to 0xeae15ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85241180 INFO: task kworker/0:338:4471 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: 99029000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:339:4472 blocked for more than 459 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:339 state:D stack:0 pid:4472 tgid:4472 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eae29d84 r8:00000002 r7:60000013 r6:eae29d8c r5:851ebc00 r4:851ebc00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:851ebc00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae29e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:8528d38c r4:8528d000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8528d38c r4:85239700 r10:61c88647 r9:851ebc00 r8:8523972c r7:82804d40 r6:dddced80 r5:dddceda0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred dd20: 99029000 dfb0b000 00000001 80239b98 7f2f9000 00000001 r4:e05addc0 r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:851ed400 r4:8291a680 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:dffff000 r5:852a4f8c r4:852a4c00 r7:ddde2d80 r6:83018200 r5:852a4f8c r4:85237a00 r10:00000000 r9:85237a00 r8:80287e08 r7:eaf91e60 r6:85237a80 r5:851ed400 r4:8523cd40 Workqueue: events bpf_prog_free_deferred dd20: 9954a000 dfb0b000 00000001 80239b98 7f2f9000 00000001 r4:00000000 r5:84be078c r4:84be0400 r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:338:4476 blocked for more than 459 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:338 state:D stack:0 pid:4476 tgid:4476 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eafd5d84 r8:00000002 r7:60000113 r6:eafd5d8c r5:851ee000 r4:851ee000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:851ee000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafd5e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8523c440 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:851ee000 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e06f9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852a538c r4:852a5000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:852a538c r4:85237b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851ee000 r8:85237b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85237b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85237b00 r8:80287e08 r7:eaf91e60 r6:85237b80 r5:851ee000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeafd5fb0 to 0xeafd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8523cc80 INFO: task kworker/1:338:4476 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: 99931000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Not tainted 6.15.0-rc7-syzkaller #0 r10:8291a684 r9:eafd9d84 r8:00000002 r7:60000113 r6:eafd9d8c r5:851eec00 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8528cf8c r4:8528cc00 r10:61c88647 r9:851eec00 r8:852397ac r7:82804d40 r6:dddced80 r5:dddceda0 Workqueue: events bpf_prog_free_deferred dd60: 80230ad0 80239bb0 800f0013 ffffffff [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) Exception stack(0xe05adfb0 to 0xe05adff8) task:kworker/0:341 state:D stack:0 pid:4480 tgid:4480 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:851ec800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafdde08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85258600 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:851ec800 r7:00000000 r6:83018000 r5:00001000 r4:7f079000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e068f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8528db8c r4:8528d800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8528db8c r4:85239800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851ec800 r8:8523982c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85239800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85239800 r8:80287e08 r7:eae29e60 r6:85237e00 r5:851ec800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeafddfb0 to 0xeafddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85258200 INFO: task kworker/0:341:4480 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 dd60: 80230ad0 80239bb0 800f0013 ffffffff r4:e05addc0 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafe1e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852584c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:851e6000 r7:00000000 r6:83018000 r5:00001000 r4:7f077000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e056b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8528d78c r4:8528d400 r10:61c88647 r9:851e6000 r8:852398ac r7:82804d40 r6:dddced80 r5:dddceda0 Workqueue: events bpf_prog_free_deferred r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 Workqueue: events bpf_prog_free_deferred r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85258740 r7:dddced80 r6:83018000 r5:8528df8c r4:85239900 r10:61c88647 r9:851e6c00 r8:8523992c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85239900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85239900 r8:80287e08 r7:eafdde60 r6:85237f00 r5:851e6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeafe5fb0 to 0xeafe5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85258680 INFO: task kworker/0:343:4484 is blocked on a mutex likely owned by task kworker/1:202:3656. Workqueue: events bpf_prog_free_deferred r4:82ac21e4 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) Exception stack(0xe05adfb0 to 0xe05adff8) r10:8291a684 r9:eaf59d84 r8:00000002 r7:60000013 r6:eaf59d8c r5:84a95400 r9:83018005 r8:84a95400 r7:00000000 r6:83018000 r5:00001000 r4:7f07f000 r5:8528e38c r4:8528e000 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 Workqueue: events bpf_prog_free_deferred r4:00000000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84a93000 r8:85239aac r7:82804d40 r6:dddced80 r5:dddceda0 r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:346:4491 blocked for more than 459 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:346 state:D stack:0 pid:4491 tgid:4491 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaff1d84 r8:00000002 r7:60000013 r6:eaff1d8c r5:84a94800 r4:84a94800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a94800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 r5:8528e78c r4:8528e400 r10:61c88647 r9:84a94800 r8:85239bac r7:82804d40 r6:dddced80 r5:dddceda0 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:852a578c r4:852a5400 r4:85237f80 r4:8523c480 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:347:4494 blocked for more than 459 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:347 state:D stack:0 pid:4494 tgid:4494 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eafe9d84 r8:00000002 r7:60000113 r6:eafe9d8c r5:84a96c00 r4:84a96c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a96c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafe9e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85258dc0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a96c00 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8528eb8c r4:8528e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8528eb8c r4:85239d00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a96c00 r8:85239d2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85239d00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85239d00 r8:80287e08 r7:eafede60 r6:85239d80 r5:84a96c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeafe9fb0 to 0xeafe9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85258940 INFO: task kworker/0:347:4494 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: 9b24f000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:84ba87c0 task:kworker/0:348 state:D stack:0 pid:4496 tgid:4496 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:852b0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08b000 r5:8528f78c r4:8528f400 r10:61c88647 r9:852b0c00 r8:85239e2c r7:82804d40 r6:dddced80 r5:dddceda0 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 dd60: 80230ad0 80239bb0 800f0013 ffffffff r4:e05addc0 r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:340 state:D stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb005e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8535e5c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:852b0000 r7:00000000 r6:83018200 r5:00001000 r4:7f0d9000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0d7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852a178c r4:852a1400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:852a178c r4:85237c80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:852b0000 r8:85237cac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85237c80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85237c80 r8:80287e08 r7:eaf91e60 r6:85239f00 r5:852b0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb005fb0 to 0xeb005ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8523c580 INFO: task kworker/1:340:4498 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: 9b601000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:349:4499 blocked for more than 459 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:349 state:D stack:0 pid:4499 tgid:4499 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb009d84 r8:00000002 r7:60000113 r6:eb009d8c r5:852b3000 r4:852b3000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:852b3000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb009e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r9:83018005 r8:852b3000 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 r5:8528f38c r4:8528f000 r10:61c88647 r9:852b3000 r8:85239fac r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xeb009fb0 to 0xeb009ff8) task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 dd60: 80230ad0 80239bb0 800f0013 ffffffff r4:e05addc0 r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:350:4502 blocked for more than 460 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:350 state:D stack:0 pid:4502 tgid:4502 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb001d84 r8:00000002 r7:60000013 r6:eb001d8c r5:852b1800 r4:852b1800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:852b1800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb001e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85259640 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:852b1800 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaceb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8528fb8c r4:8528f800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8528fb8c r4:85250080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:852b1800 r8:852500ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85250080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85250080 r8:80287e08 r7:eaffde60 r6:85250100 r5:852b1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb001fb0 to 0xeb001ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred dd20: 9b746000 dfb0b000 00000001 80239b98 7f2f9000 00000001 r4:e05addc0 r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:852b3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f091000 r5:8529838c r4:85298000 r10:61c88647 r9:852b3c00 r8:852501ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:852593c0 Workqueue: events bpf_prog_free_deferred dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 Not tainted 6.15.0-rc7-syzkaller #0 r10:8291a684 r9:eaff9d84 r8:00000002 r7:60000113 r6:eaff9d8c r5:852b4800 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:852b4800 r8:852502ac r7:82804d40 r6:dddced80 r5:dddceda0 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:353:4508 blocked for more than 460 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:353 state:D stack:0 pid:4508 tgid:4508 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb00dd84 r8:00000002 r7:60000013 r6:eb00dd8c r5:852b5400 r4:852b5400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:852b5400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb00de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85259ac0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:852b5400 r7:00000000 r6:83018000 r5:00001000 r4:7f093000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead27000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529878c r4:85298400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529878c r4:85250380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:852b5400 r8:852503ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85250380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85250380 r8:80287e08 r7:eadf9e60 r6:85250400 r5:852b5400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb00dfb0 to 0xeb00dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852597c0 INFO: task kworker/0:353:4508 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: 9c08e000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:354 state:D stack:0 pid:4510 tgid:4510 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb011d84 r8:00000002 r7:60000013 r6:eb011d8c r5:852b6000 r4:852b6000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:852b6000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb011e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85259e00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:852b6000 r7:00000000 r6:83018000 r5:00001000 r4:7f097000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead4f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85298f8c r4:85298c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85298f8c r4:85250480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:852b6000 r8:852504ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85250480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85250480 r8:80287e08 r7:eb00de60 r6:85250500 r5:852b6000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb011fb0 to 0xeb011ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852598c0 INFO: task kworker/0:354:4510 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: 9c14c000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:84ba87c0 task:kworker/0:355 state:D stack:0 pid:4512 tgid:4512 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r4:00000000 r5:00001000 r4:ead3b000 r5:85298b8c r4:85298800 r10:61c88647 r9:852b6c00 r8:852505ac r7:82804d40 r6:dddced80 r5:dddceda0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r5:84be078c r4:84be0400 r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:84ba87c0 task:kworker/0:356 state:D stack:0 pid:4514 tgid:4514 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:852b2400 r8:852506ac r7:82804d40 r6:dddced80 r5:dddceda0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:85259c80 INFO: task kworker/0:356:4514 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: 9c92c000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:357:4517 blocked for more than 460 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:357 state:D stack:0 pid:4517 tgid:4517 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb01dd84 r8:00000002 r7:60000113 r6:eb01dd8c r5:84a96000 r4:84a96000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a96000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb01de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85259f40 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a96000 r7:00000000 r6:83018000 r5:00001000 r4:7f099000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529938c r4:85299000 r7:dddced80 r6:83018000 r5:8529938c r4:85250780 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred dd20: 9c92c000 dfb0b000 00000001 80239b98 7f2f9000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 Exception stack(0xe05adfb0 to 0xe05adff8) Not tainted 6.15.0-rc7-syzkaller #0 r4:84998000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb021e08 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8529978c r4:85299400 r10:61c88647 r9:84998000 r8:852508ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85259ec0 Workqueue: events bpf_prog_free_deferred dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:359:4521 blocked for more than 460 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:359 state:D stack:0 pid:4521 tgid:4521 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb025d84 r8:00000002 r7:60000113 r6:eb025d8c r5:84998c00 r4:84998c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84998c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb025e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85261280 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84998c00 r7:00000000 r6:83018000 r5:00001000 r4:7f09f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85299f8c r4:85299c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85299f8c r4:85250980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84998c00 r8:852509ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85250980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred dd20: 9cf5c000 dfb0b000 00000001 80239b98 7f2f9000 00000001 r4:e05addc0 r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 INFO: task kworker/0:360:4522 blocked for more than 460 seconds. [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r4:00000000 r5:8529a38c r4:8529a000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:85250a80 r8:80287e08 r7:eb025e60 r6:85250b00 r5:84999800 task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 dd60: 80230ad0 80239bb0 800f0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 Exception stack(0xe05adfb0 to 0xe05adff8) Not tainted 6.15.0-rc7-syzkaller #0 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:8499a400 r8:85250bac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85250b80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85250b80 r8:80287e08 r7:eb029e60 r6:85250c00 r5:8499a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb02dfb0 to 0xeb02dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85261300 INFO: task kworker/0:361:4524 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: 9d159000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:362:4526 blocked for more than 460 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:362 state:D stack:0 pid:4526 tgid:4526 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb045d84 r8:00000002 r7:60000113 r6:eb045d8c r5:85321800 r4:85321800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85321800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb045e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85261740 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85321800 r7:00000000 r6:83018000 r5:00001000 r4:7f0a5000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb03b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529ab8c r4:8529a800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529ab8c r4:85250c80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85321800 r8:85250cac r7:82804d40 r6:dddced80 r5:dddceda0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 dd60: 80230ad0 80239bb0 800f0013 ffffffff r4:00000000 r5:00001000 r4:dfd07000 r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84ba87c0 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:85320000 r7:00000000 r6:83018000 r5:00001000 r4:7f0ab000 r5:8529b38c r4:8529b000 r10:61c88647 r9:85320000 r8:85250d2c r7:82804d40 r6:dddced80 r5:dddceda0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 Exception stack(0xe05adfb0 to 0xe05adff8) INFO: task kworker/0:364:4529 blocked for more than 460 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:364 state:D stack:0 pid:4529 tgid:4529 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb055d84 r8:00000002 r7:60000113 r6:eb055d8c r5:85322400 r4:85322400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85322400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb055e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85261940 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85322400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a7000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb04b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529af8c r4:8529ac00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529af8c r4:85250d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85322400 r8:85250dac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85250d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85250d80 r8:80287e08 r7:eb049e60 r6:85359000 r5:85322400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb055fb0 to 0xeb055ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852617c0 INFO: task kworker/0:364:4529 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: 9d940000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:365:4533 blocked for more than 460 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:365 state:D stack:0 pid:4533 tgid:4533 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85324800 r4:8291a680 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529b78c r4:8529b400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529b78c r4:85250e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85324800 r8:85250e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85250e00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85250e00 r8:80287e08 r7:eb049e60 r6:85359080 r5:85324800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb071fb0 to 0xeb071ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85261840 INFO: task kworker/0:365:4533 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: 9d940000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:852a038c r4:852a0000 r7:dddced80 r6:83018000 r5:852a038c r4:85250e80 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred Exception stack(0xe05add28 to 0xe05add70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r5:00001000 r4:dfd07000 r4:84bbbf00 r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:367:4535 blocked for more than 460 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:367 state:D stack:0 pid:4535 tgid:4535 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb081d84 r8:00000002 r7:60000013 r6:eb081d8c r5:85326000 r4:85326000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85326000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb081e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85261c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85326000 r7:00000000 r6:83018000 r5:00001000 r4:7f0af000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb073000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529bb8c r4:8529b800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529bb8c r4:85250f00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85326000 r8:85250f2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85250f00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85250f00 r8:80287e08 r7:eb07de60 r6:85359180 r5:85326000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb081fb0 to 0xeb081ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852618c0 INFO: task kworker/0:367:4535 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: 9de3f000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 r4:e05addc0 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:84ba87c0 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:85323000 r8:85250fac r7:82804d40 r6:dddced80 r5:dddceda0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:369:4540 blocked for more than 460 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:369 state:D stack:0 pid:4540 tgid:4540 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb0a5d84 r8:00000002 r7:60000113 r6:eb0a5d8c r5:85326c00 r4:85326c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85326c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0a5e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85261680 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85326c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0b5000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0a7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852a078c r4:852a0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852a078c r4:85355000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 INFO: task kworker/0:370:4542 blocked for more than 460 seconds. [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8535e140 r5:852a0b8c r4:852a0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:85355080 r8:80287e08 r7:eb0a5e60 r6:85359300 r5:85323c00 task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 r4:00000001 r4:84ba87c0 task:kworker/0:371 state:D stack:0 pid:4544 tgid:4544 ppid:2 task_flags:0x4208060 flags:0x00000000 Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb0bdd84 r8:00000002 r7:60000013 r6:eb0bdd8c r5:85320c00 r4:85320c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85320c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0bde08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8535e340 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85320c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0bf000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852a0f8c r4:852a0c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852a0f8c r4:85355100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85320c00 r8:8535512c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85355100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85355100 r8:80287e08 r7:eb0b1e60 r6:85359380 r5:85320c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0bdfb0 to 0xeb0bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8535e100 INFO: task kworker/0:371:4544 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: 9e7e5000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:372:4546 blocked for more than 460 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:372 state:D stack:0 pid:4546 tgid:4546 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb0c9d84 r8:00000002 r7:60000113 r6:eb0c9d8c r5:85328000 r4:85328000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0c9e08 r9:83018005 r8:85328000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852a138c r4:852a1000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852a138c r4:85355180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85328000 r8:853551ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85355180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85355180 r8:80287e08 r7:eb0bde60 r6:85359400 r5:85328000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0c9fb0 to 0xeb0c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8535e100 INFO: task kworker/0:372:4546 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: 9ea84000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 INFO: task kworker/0:373:4548 blocked for more than 460 seconds. [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:852a278c r4:852a2400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85328c00 r8:8535522c r7:82804d40 r6:dddced80 r5:dddceda0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) dd60: 80230ad0 80239bb0 800f0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/1:341:4550 blocked for more than 460 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:341 state:D stack:0 pid:4550 tgid:4550 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb0a1d84 r8:00000002 r7:60000113 r6:eb0a1d8c r5:85329800 r4:85329800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85329800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0a1e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d3f40 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85329800 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0745000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852a678c r4:852a6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:852a678c r4:85359500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85329800 r8:8535952c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85359500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85359500 r8:80287e08 r7:eaf91e60 r6:85359580 r5:85329800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0a1fb0 to 0xeb0a1ff8) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) dd60: 80230ad0 80239bb0 800f0013 ffffffff r4:00000000 r5:00001000 r4:dfd07000 r4:84bbbf00 r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:374:4552 blocked for more than 460 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:374 state:D stack:0 pid:4552 tgid:4552 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eae41d84 r8:00000002 r7:60000013 r6:eae41d8c r5:8532a400 r4:8532a400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8532a400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae41e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8535e740 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8532a400 r7:00000000 r6:83018000 r5:00001000 r4:7f0db000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0df000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852a1b8c r4:852a1800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852a1b8c r4:85355280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8532a400 r8:853552ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:8535e540 INFO: task kworker/0:374:4552 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: 9f284000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:84ba87c0 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:8532b000 r7:00000000 r6:83018000 r5:00001000 r4:7f015000 r5:852a1f8c r4:852a1c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:85355300 dfa0: 00000000 00000000 00000000 00000000 [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 Exception stack(0xe05adfb0 to 0xe05adff8) INFO: task kworker/0:376:4555 blocked for more than 460 seconds. r5:8532bc00 r4:8291a680 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:8532bc00 r8:853553ac r7:82804d40 r6:dddced80 r5:dddceda0 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: 9f6a1000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:377:4558 blocked for more than 460 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:377 state:D stack:0 pid:4558 tgid:4558 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaf19d84 r8:00000002 r7:60000113 r6:eaf19d8c r5:8532e000 r4:8532e000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8532e000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf19e08 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8538db8c r4:8538d800 r7:dddced80 r6:83018000 r5:8538db8c r4:85355400 r4:85355400 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:378 state:D stack:0 pid:4559 tgid:4559 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf25e08 r9:83018005 r8:8532c800 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000 r5:852a2b8c r4:852a2800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) dd60: 80230ad0 80239bb0 800f0013 ffffffff [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r4:8532d400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8532d400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf49e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8535ed80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8532d400 r7:00000000 r6:83018000 r5:00001000 r4:7f02f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe1f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852a2f8c r4:852a2c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852a2f8c r4:85355500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8532d400 r8:8535552c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85355500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85355500 r8:80287e08 r7:eaf19e60 r6:85359880 r5:8532d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf49fb0 to 0xeaf49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8535ea40 INFO: task kworker/0:379:4561 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: 9fc78000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:380:4564 blocked for more than 460 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:380 state:D stack:0 pid:4564 tgid:4564 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:85331800 r7:00000000 r6:83018000 r5:00001000 r4:7f031000 r5:852a338c r4:852a3000 r4:85355580 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:85332400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf7de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8535e440 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85332400 r7:00000000 r6:83018000 r5:00001000 r4:7f033000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00e5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852a378c r4:852a3400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852a378c r4:85355600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85332400 r8:8535562c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85355600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85355600 r8:80287e08 r7:eaf19e60 r6:85359980 r5:85332400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf7dfb0 to 0xeaf7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8535ed40 INFO: task kworker/0:381:4565 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: a002f000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings task:kworker/0:382 state:D stack:0 pid:4567 tgid:4567 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:852a3b8c r4:85355680 r4:85355680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85355680 r8:80287e08 r7:eaf19e60 r6:85359a00 r5:85330c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf99fb0 to 0xeaf99ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8535efc0 INFO: task kworker/0:382:4567 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: a002f000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r5:84be078c r4:84be0400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:852a3f8c r4:852a3c00 r7:dddced80 r6:83018000 r5:852a3f8c r4:85355700 r10:00000000 r9:85355700 r8:80287e08 r7:eaf19e60 r6:85359a80 r5:85333c00 r4:8535ef80 INFO: task kworker/0:383:4569 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: a0378000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:384:4572 blocked for more than 460 seconds. Not tainted 6.15.0-rc7-syzkaller #0 task:kworker/0:384 state:D stack:0 pid:4572 tgid:4572 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0ede08 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8538c38c r4:8538c000 r7:dddced80 r6:83018000 r5:8538c38c r4:85355780 r4:85355780 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:385 state:D stack:0 pid:4573 tgid:4573 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb0f1d84 r8:00000002 r7:60000113 r6:eb0f1d8c r5:85335400 r4:85335400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85335400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0f1e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8536f400 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85335400 r7:00000000 r6:83018000 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9af000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8538c78c r4:8538c400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8538c78c r4:85355800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85335400 r8:8535582c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85355800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85355800 r8:80287e08 r7:eaf19e60 r6:85359b80 r5:85335400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0f1fb0 to 0xeb0f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8536f080 INFO: task kworker/0:385:4573 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: a095d000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:00000000 r5:84be078c r4:84be0400 r4:84bbbf00 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: r5:85334800 r4:8291a680 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:8538cb8c r4:8538c800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:85355880 r8:80287e08 r7:eaf19e60 r6:85359c00 r5:85334800 r4:8536f200 [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: a095d000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:387:4578 blocked for more than 460 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eab29000 r5:8538cf8c r4:8538cc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85336000 r8:8535592c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8536f3c0 Workqueue: events bpf_prog_free_deferred Exception stack(0xe05add28 to 0xe05add70) dd20: a095d000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:8538d38c r4:8538d000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85330000 r8:853559ac r7:82804d40 r6:dddced80 r5:dddceda0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 r4:e05addc0 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xe05adfb0 to 0xe05adff8) Not tainted 6.15.0-rc7-syzkaller #0 Call trace: r5:85338000 r4:8291a680 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r5:00001000 r4:eab57000 r5:8538d78c r4:8538d400 r7:dddced80 r6:83018000 r5:8538d78c r4:85355a00 r4:85355a00 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe05add28 to 0xe05add70) [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:390 state:D stack:0 pid:4585 tgid:4585 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb031e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8536fb80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8499c800 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac6b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8538df8c r4:8538dc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8538df8c r4:85355a80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8499c800 r8:85355aac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85355a80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85355a80 r8:80287e08 r7:eaf19e60 r6:85355b00 r5:8499c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb031fb0 to 0xeb031ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8536f840 INFO: task kworker/0:390:4585 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: a1927000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:391:4586 blocked for more than 460 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:391 state:D stack:0 pid:4586 tgid:4586 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb119d84 r8:00000002 r7:60000113 r6:eb119d8c r5:8499d400 r4:8499d400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8499d400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb119e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8536fbc0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8499d400 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8538e38c r4:8538e000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fa0: 00000000 00000000 00000000 00000000 r4:8536f840 INFO: task kworker/0:391:4586 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: a1927000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:392:4589 blocked for more than 460 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:392 state:D stack:0 pid:4589 tgid:4589 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb11dd84 r8:00000002 r7:60000113 r6:eb11dd8c r5:8499e000 r4:8499e000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8499e000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:8538e78c r4:8538e400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xe05adfb0 to 0xe05adff8) INFO: task kworker/0:393:4590 blocked for more than 460 seconds. r4:8499ec00 [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:00001000 r4:eae67000 r5:8538ef8c r4:8538ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8538ef8c r4:85355d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8499ec00 r8:85355dac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85355d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85355d80 r8:80287e08 r7:eb11de60 r6:85355e00 r5:8499ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb121fb0 to 0xeb121ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8536fcc0 INFO: task kworker/0:393:4590 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: a1f6f000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb125d84 r8:00000002 r7:60000013 r6:eb125d8c r5:8499b000 r4:8499b000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8499b000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb125e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8536ffc0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8499b000 r7:00000000 r6:83018000 r5:00001000 r4:7f04d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae43000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8538eb8c r4:8538e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8538eb8c r4:85355e80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8499b000 r8:85355eac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85355e80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85355e80 r8:80287e08 r7:eb121e60 r6:85355f00 r5:8499b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb125fb0 to 0xeb125ff8) 5fa0: 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r5:00001000 r4:dfd07000 r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: r5:84b40000 r4:8291a680 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85389280 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84b40000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae81000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8538f38c r4:8538f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8538f38c r4:85355f80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b40000 r8:85355fac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85355f80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85355f80 r8:80287e08 r7:eb121e60 r6:853c8000 r5:84b40000 r4:00000001 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe05add28 to 0xe05add70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r5:00001000 r4:dfd07000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:84b40c00 r4:8291a680 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8538f78c r4:8538f400 r4:853c8080 9fa0: 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe05add28 to 0xe05add70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:397:4598 blocked for more than 460 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:397 state:D stack:0 pid:4598 tgid:4598 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb131d84 r8:00000002 r7:60000013 r6:eb131d8c r5:84b42400 r4:84b42400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b42400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb131e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85389700 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84b42400 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf01000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8538fb8c r4:8538f800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8538fb8c r4:853c8180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b42400 r8:853c81ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:853c8180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853c8180 r8:80287e08 r7:eb039e60 r6:853c8200 r5:84b42400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb131fb0 to 0xeb131ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85389380 INFO: task kworker/0:397:4598 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: a299b000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:84be078c r4:84be0400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: r5:84b43c00 r4:8291a680 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:85398f8c r4:85398c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:853c8280 r8:80287e08 r7:eb131e60 r6:853c8300 r5:84b43c00 task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:84b44800 r7:00000000 r6:83018000 r5:00001000 r4:7f057000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf15000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8538ff8c r4:8538fc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8538ff8c r4:853c8380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b44800 r8:853c83ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:853c8380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853c8380 r8:80287e08 r7:eb135e60 r6:853c8400 r5:84b44800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb139fb0 to 0xeb139ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85389780 INFO: task kworker/0:399:4602 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: a299b000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:400:4604 blocked for more than 460 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:400 state:D stack:0 pid:4604 tgid:4604 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r4:84b41800 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:8539838c r4:853c8480 r4:00000001 r4:85389640 Workqueue: events bpf_prog_free_deferred dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: r5:84b43000 r4:8291a680 [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb141e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85389d00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84b43000 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf5d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8539878c r4:85398400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8539878c r4:853c8580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b43000 r8:853c85ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:853c8580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853c8580 r8:80287e08 r7:eb135e60 r6:853c8600 r5:84b43000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb141fb0 to 0xeb141ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85389840 INFO: task kworker/0:401:4606 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: a2e36000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:402:4608 blocked for more than 460 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:402 state:D stack:0 pid:4608 tgid:4608 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb145d84 r8:00000002 r7:60000013 r6:eb145d8c r5:84b45400 r4:84b45400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b45400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb145e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85389f00 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85398b8c r4:85398800 r7:dddced80 r6:83018000 r5:85398b8c r4:853c8680 r10:00000000 r9:853c8680 r8:80287e08 r7:eb135e60 r6:853c8700 r5:84b45400 r4:85389a40 Call trace: dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 r4:00000000 r5:84be078c r4:84be0400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:84ba87c0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced80 r6:83018000 r5:8539978c r4:853c8780 r4:00000001 r4:85387100 Call trace: Exception stack(0xe05add28 to 0xe05add70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r5:84be078c r4:84be0400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:404:4612 blocked for more than 460 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:404 state:D stack:0 pid:4612 tgid:4612 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb129d84 r8:00000002 r7:60000113 r6:eb129d8c r5:84b46000 r4:84b46000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b46000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb129e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85387400 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84b46000 r7:00000000 r6:83018000 r5:00001000 r4:7f061000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafc7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8539938c r4:85399000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8539938c r4:853c8880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b46000 r8:853c88ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:853c8880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853c8880 r8:80287e08 r7:eb149e60 r6:853c8900 r5:84b46000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb129fb0 to 0xeb129ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85387440 INFO: task kworker/0:404:4612 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) dd60: 80230ad0 80239bb0 800f0013 ffffffff r4:e05addc0 r5:00001000 r4:dfd07000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb151e08 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85399b8c r4:85399800 r10:61c88647 r9:84b46c00 r8:853c89ac r7:82804d40 r6:dddced80 r5:dddceda0 task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r4:00000000 r5:84be078c r4:84be0400 r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb15dd84 r8:00000002 r7:60000113 r6:eb15dd8c r5:852c0000 r4:852c0000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:852c0000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb15de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85387800 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:852c0000 r7:00000000 r6:83018000 r5:00001000 r4:7f0b9000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb165000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85399f8c r4:85399c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85399f8c r4:853c8a80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:852c0000 r8:853c8aac r7:82804d40 r6:dddced80 r5:dddceda0 r4:853c8a80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853c8a80 r8:80287e08 r7:eb151e60 r6:853c8b00 r5:852c0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb15dfb0 to 0xeb15dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85387480 INFO: task kworker/0:406:4617 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: a3b9d000 dfb0b000 00000001 80239b98 7f2f9000 00000001 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 r4:84ba87c0 Call trace: r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb169e08 r5:8539a38c r4:8539a000 r10:61c88647 r9:852c0c00 r8:853c8bac r7:82804d40 r6:dddced80 r5:dddceda0 Workqueue: events bpf_prog_free_deferred dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:00001000 r4:dfd07000 r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:8533a400 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r5:8539ab8c r4:8539a800 r10:61c88647 r9:8533a400 r8:853c8cac r7:82804d40 r6:dddced80 r5:dddceda0 r4:853c8c80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853c8c80 r8:80287e08 r7:eb169e60 r6:85359e00 r5:8533a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb191fb0 to 0xeb191ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85387840 INFO: task kworker/0:408:4620 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: a4026000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:409 state:D stack:0 pid:4623 tgid:4623 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb19de08 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8539a78c r4:8539a400 r7:dddced80 r6:83018000 r5:8539a78c r4:853c8d00 r4:853c8d00 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r4:82ac21e4 r4:00000000 r5:84be078c r4:84be0400 r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:84ba87c0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:8539b38c r4:8539b000 r10:61c88647 r9:852c1800 r8:853c8e2c r7:82804d40 r6:dddced80 r5:dddceda0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:411:4625 blocked for more than 461 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:411 state:D stack:0 pid:4625 tgid:4625 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb181d84 r8:00000002 r7:60000013 r6:eb181d8c r5:852c2400 r4:852c2400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:852c2400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb181e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85387ec0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:852c2400 r7:00000000 r6:83018000 r5:00001000 r4:7f0c1000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1a3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8539af8c r4:8539ac00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8539af8c r4:853c8f00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:852c2400 r8:853c8f2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:853c8f00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853c8f00 r8:80287e08 r7:eb175e60 r6:853c8f80 r5:852c2400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb181fb0 to 0xeb181ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85387c80 INFO: task kworker/0:411:4625 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 r4:82ac21e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:412:4629 blocked for more than 461 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:412 state:D stack:0 pid:4629 tgid:4629 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb1a1d84 r8:00000002 r7:60000013 r6:eb1a1d8c r5:852c3000 r4:852c3000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:852c3000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1a1e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85360080 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:852c3000 r7:00000000 r6:83018000 r5:00001000 r4:7f0c5000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1b9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8539b78c r4:8539b400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8539b78c r4:853d2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:852c3000 r8:853d202c r7:82804d40 r6:dddced80 r5:dddceda0 r4:853d2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853d2000 r8:80287e08 r7:eb175e60 r6:853d2080 r5:852c3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1a1fb0 to 0xeb1a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85360f40 INFO: task kworker/0:412:4629 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: a4759000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:413:4630 blocked for more than 461 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:413 state:D stack:0 pid:4630 tgid:4630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb1bdd84 r8:00000002 r7:60000113 r6:eb1bdd8c r5:852c3c00 r4:852c3c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:852c3c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1bde08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85261f80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:852c3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0c7000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1c5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8539bb8c r4:8539b800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8539bb8c r4:853d2100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:852c3c00 r8:853d212c r7:82804d40 r6:dddced80 r5:dddceda0 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: a4bf4000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:414:4637 blocked for more than 461 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:414 state:D stack:0 pid:4637 tgid:4637 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb1c9d84 r8:00000002 r7:60000113 r6:eb1c9d8c r5:852c4800 r4:852c4800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:852c4800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1c9e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853df100 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:852c4800 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8539bf8c r4:8539bc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8539bf8c r4:853d2200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:852c4800 r8:853d222c r7:82804d40 r6:dddced80 r5:dddceda0 r4:853d2200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853d2200 r8:80287e08 r7:eb1bde60 r6:853d2280 r5:852c4800 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: a4bf4000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 Exception stack(0xe05adfb0 to 0xe05adff8) INFO: task kworker/0:415:4638 blocked for more than 461 seconds. r4:852c5400 [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:852c5400 r7:00000000 r6:83018000 r5:00001000 r4:7f065000 r5:853a038c r4:853a0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:852c5400 r8:853d232c r7:82804d40 r6:dddced80 r5:dddceda0 r4:853d2300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853d2300 r8:80287e08 r7:eb1c9e60 r6:853d2380 r5:852c5400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1b1fb0 to 0xeb1b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853df300 INFO: task kworker/0:415:4638 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: a548a000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:853a078c r4:853a0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853a078c r4:853d2400 r10:61c88647 r9:852c6000 r8:853d242c r7:82804d40 r6:dddced80 r5:dddceda0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r5:00001000 r4:dfd07000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:417:4640 blocked for more than 461 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:417 state:D stack:0 pid:4640 tgid:4640 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb05dd84 r8:00000002 r7:60000113 r6:eb05dd8c r5:852c6c00 r4:852c6c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:852c6c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb05de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853df480 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:852c6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f069000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedd000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853a0b8c r4:853a0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853a0b8c r4:853d2500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:852c6c00 r8:853d252c r7:82804d40 r6:dddced80 r5:dddceda0 r4:853d2500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853d2500 r8:80287e08 r7:eb051e60 r6:853d2580 r5:852c6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb05dfb0 to 0xeb05dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853df300 INFO: task kworker/0:417:4640 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: a548a000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:418:4641 blocked for more than 461 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:418 state:D stack:0 pid:4641 tgid:4641 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb061d84 r8:00000002 r7:60000113 r6:eb061d8c r5:84b68000 r4:84b68000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b68000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb061e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853dc640 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84b68000 r7:00000000 r6:83018000 r5:00001000 r4:7f085000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853a178c r4:853a1400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853a178c r4:853d2600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b68000 r8:853d262c r7:82804d40 r6:dddced80 r5:dddceda0 r4:853d2600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853d2600 r8:80287e08 r7:eb05de60 r6:853d2680 r5:84b68000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb061fb0 to 0xeb061ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853df300 INFO: task kworker/0:418:4641 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: a5a03000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:419:4642 blocked for more than 461 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:419 state:D stack:0 pid:4642 tgid:4642 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb069d84 r8:00000002 r7:60000113 r6:eb069d8c r5:84b68c00 r4:84b68c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b68c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb069e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853df580 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84b68c00 r7:00000000 r6:83018000 r5:00001000 r4:7f06b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffa3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853a0f8c r4:853a0c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853a0f8c r4:853d2700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b68c00 r8:853d272c r7:82804d40 r6:dddced80 r5:dddceda0 r4:853d2700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853d2700 r8:80287e08 r7:eb061e60 r6:853d2780 r5:84b68c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb069fb0 to 0xeb069ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853df300 INFO: task kworker/0:419:4642 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: a5a03000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:420:4643 blocked for more than 461 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:420 state:D stack:0 pid:4643 tgid:4643 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb06dd84 r8:00000002 r7:60000113 r6:eb06dd8c r5:84b69800 r4:84b69800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b69800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb06de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853dfc80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84b69800 r7:00000000 r6:83018000 r5:00001000 r4:7f06f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e04d9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853a138c r4:853a1000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853a138c r4:853d2800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b69800 r8:853d282c r7:82804d40 r6:dddced80 r5:dddceda0 r4:853d2800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853d2800 r8:80287e08 r7:eb061e60 r6:853d2880 r5:84b69800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb06dfb0 to 0xeb06dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853df300 INFO: task kworker/0:420:4643 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: a5ede000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:342:4648 blocked for more than 461 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:342 state:D stack:0 pid:4648 tgid:4648 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb09dd84 r8:00000002 r7:60000013 r6:eb09dd8c r5:84b6a400 r4:84b6a400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b6a400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb09de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d3fc0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b6a400 r7:00000000 r6:83018200 r5:00001000 r4:7f075000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e06f7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852a638c r4:852a6000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:852a638c r4:85359e80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b6a400 r8:85359eac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85359e80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85359e80 r8:80287e08 r7:eb0a1e60 r6:853d2900 r5:84b6a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb09dfb0 to 0xeb09dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853d3d00 INFO: task kworker/1:342:4648 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: a5ede000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:343:4650 blocked for more than 461 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:343 state:D stack:0 pid:4650 tgid:4650 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb0b9d84 r8:00000002 r7:60000013 r6:eb0b9d8c r5:84b6b000 r4:84b6b000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b6b000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0b9e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853e35c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b6b000 r7:00000000 r6:83018200 r5:00001000 r4:7f08d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead73000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852f878c r4:852f8400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:852f878c r4:85359f00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b6b000 r8:85359f2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85359f00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85359f00 r8:80287e08 r7:eb0a1e60 r6:853d2980 r5:84b6b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0b9fb0 to 0xeb0b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853d3e40 INFO: task kworker/1:343:4650 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: a6526000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:344:4652 blocked for more than 461 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:344 state:D stack:0 pid:4652 tgid:4652 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb0d1d84 r8:00000002 r7:60000113 r6:eb0d1d8c r5:84b6bc00 r4:84b6bc00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b6bc00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0d1e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d3740 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b6bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e88f5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852a6b8c r4:852a6800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:852a6b8c r4:85359f80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b6bc00 r8:85359fac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85359f80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85359f80 r8:80287e08 r7:eb0b9e60 r6:853d2a00 r5:84b6bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0d1fb0 to 0xeb0d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853d3680 INFO: task kworker/1:344:4652 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: a6526000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:345:4654 blocked for more than 461 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:345 state:D stack:0 pid:4654 tgid:4654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb1d9d84 r8:00000002 r7:60000113 r6:eb1d9d8c r5:84b6e000 r4:84b6e000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b6e000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1d9e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d3700 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b6e000 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa1f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852a6f8c r4:852a6c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:852a6f8c r4:853e8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b6e000 r8:853e802c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853e8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853e8000 r8:80287e08 r7:eb0b9e60 r6:853d2a80 r5:84b6e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1d9fb0 to 0xeb1d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853d3b40 INFO: task kworker/1:345:4654 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: a6943000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:346:4656 blocked for more than 461 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:346 state:D stack:0 pid:4656 tgid:4656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb1e1d84 r8:00000002 r7:60000113 r6:eb1e1d8c r5:84b6d400 r4:84b6d400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b6d400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1e1e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d3400 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b6d400 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa47000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852a738c r4:852a7000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:852a738c r4:853e8080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b6d400 r8:853e80ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853e8080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853e8080 r8:80287e08 r7:eb0b9e60 r6:853d2b00 r5:84b6d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1e1fb0 to 0xeb1e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853d3580 INFO: task kworker/1:346:4656 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: a6943000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:347:4658 blocked for more than 461 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:347 state:D stack:0 pid:4658 tgid:4658 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb1e9d84 r8:00000002 r7:60000013 r6:eb1e9d8c r5:84b6c800 r4:84b6c800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b6c800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1e9e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d31c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b6c800 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaab7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852a778c r4:852a7400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:852a778c r4:853e8100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b6c800 r8:853e812c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853e8100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853e8100 r8:80287e08 r7:eb0b9e60 r6:853d2b80 r5:84b6c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1e9fb0 to 0xeb1e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853d3340 INFO: task kworker/1:347:4658 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: a6f87000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:348:4660 blocked for more than 461 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:348 state:D stack:0 pid:4660 tgid:4660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb1edd84 r8:00000002 r7:60000013 r6:eb1edd8c r5:84b6ec00 r4:84b6ec00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b6ec00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1ede08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853dffc0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b6ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f081000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eace5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852a7b8c r4:852a7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:852a7b8c r4:853e8180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b6ec00 r8:853e81ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853e8180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853e8180 r8:80287e08 r7:eb0b9e60 r6:853d2c00 r5:84b6ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1edfb0 to 0xeb1edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853d3b40 INFO: task kworker/1:348:4660 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: a6f87000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:421:4662 blocked for more than 461 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:421 state:D stack:0 pid:4662 tgid:4662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb1f1d84 r8:00000002 r7:60000113 r6:eb1f1d8c r5:852c8000 r4:852c8000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:852c8000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1f1e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84791240 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:852c8000 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead01000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852a7f8c r4:852a7c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852a7f8c r4:853d2c80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:852c8000 r8:853d2cac r7:82804d40 r6:dddced80 r5:dddceda0 r4:853d2c80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853d2c80 r8:80287e08 r7:eb061e60 r6:853d2d00 r5:852c8000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1f1fb0 to 0xeb1f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853dc300 INFO: task kworker/0:421:4662 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: a6f87000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:349:4663 blocked for more than 461 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:349 state:D stack:0 pid:4663 tgid:4663 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb1e5d84 r8:00000002 r7:60000013 r6:eb1e5d8c r5:852c8c00 r4:852c8c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:852c8c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1e5e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853e3300 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:852c8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f089000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead51000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8471178c r4:84711400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8471178c r4:853e8200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:852c8c00 r8:853e822c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853e8200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853e8200 r8:80287e08 r7:eb0b9e60 r6:853d2d80 r5:852c8c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1e5fb0 to 0xeb1e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84a03500 INFO: task kworker/1:349:4663 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: a72b9000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:422:4666 blocked for more than 461 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:422 state:D stack:0 pid:4666 tgid:4666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb079d84 r8:00000002 r7:60000113 r6:eb079d8c r5:852c9800 r4:852c9800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:852c9800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb079e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853dca00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:852c9800 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead99000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852f8b8c r4:852f8800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852f8b8c r4:853d2e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:852c9800 r8:853d2e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:853d2e00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853d2e00 r8:80287e08 r7:eb061e60 r6:853d2e80 r5:852c9800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb079fb0 to 0xeb079ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853dc4c0 INFO: task kworker/0:422:4666 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: a7508000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:423:4668 blocked for more than 461 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:423 state:D stack:0 pid:4668 tgid:4668 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb041d84 r8:00000002 r7:60000113 r6:eb041d8c r5:852ca400 r4:852ca400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:852ca400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb041e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853dc7c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:852ca400 r7:00000000 r6:83018000 r5:00001000 r4:7f087000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead39000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853a1b8c r4:853a1800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853a1b8c r4:853d2f00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:852ca400 r8:853d2f2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:853d2f00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853d2f00 r8:80287e08 r7:eb079e60 r6:853d2f80 r5:852ca400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb041fb0 to 0xeb041ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853dc5c0 INFO: task kworker/0:423:4668 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: a7508000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:424:4671 blocked for more than 461 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:424 state:D stack:0 pid:4671 tgid:4671 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb1f5d84 r8:00000002 r7:60000113 r6:eb1f5d8c r5:852cb000 r4:852cb000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:852cb000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1f5e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853dc800 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:852cb000 r7:00000000 r6:83018000 r5:00001000 r4:7f08b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead63000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852f838c r4:852f8000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852f838c r4:853e1000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:852cb000 r8:853e102c r7:82804d40 r6:dddced80 r5:dddceda0 r4:853e1000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853e1000 r8:80287e08 r7:eb079e60 r6:853e1080 r5:852cb000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1f5fb0 to 0xeb1f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853dc5c0 INFO: task kworker/0:424:4671 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: a79d8000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:350:4672 blocked for more than 461 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:350 state:D stack:0 pid:4672 tgid:4672 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb1fdd84 r8:00000002 r7:60000013 r6:eb1fdd8c r5:852cbc00 r4:852cbc00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:852cbc00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1fde08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853e3bc0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:852cbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbd000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852f938c r4:852f9000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:852f938c r4:853e8280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:852cbc00 r8:853e82ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853e8280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853e8280 r8:80287e08 r7:eb0b9e60 r6:853e1100 r5:852cbc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1fdfb0 to 0xeb1fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853e3540 INFO: task kworker/1:350:4672 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: a7bf6000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:351:4674 blocked for more than 461 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:351 state:D stack:0 pid:4674 tgid:4674 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb201d84 r8:00000002 r7:60000013 r6:eb201d8c r5:852cc800 r4:852cc800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:852cc800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb201e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853e3a80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:852cc800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852f8f8c r4:852f8c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:852f8f8c r4:853e8300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:852cc800 r8:853e832c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853e8300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853e8300 r8:80287e08 r7:eb1fde60 r6:853e1180 r5:852cc800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb201fb0 to 0xeb201ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853e3500 INFO: task kworker/1:351:4674 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: a7bf6000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:425:4676 blocked for more than 461 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:425 state:D stack:0 pid:4676 tgid:4676 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb1f9d84 r8:00000002 r7:60000113 r6:eb1f9d8c r5:852cd400 r4:852cd400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:852cd400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1f9e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853dcc40 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:852cd400 r7:00000000 r6:83018000 r5:00001000 r4:7f091000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadc1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853a1f8c r4:853a1c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853a1f8c r4:853e1200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:852cd400 r8:853e122c r7:82804d40 r6:dddced80 r5:dddceda0 r4:853e1200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853e1200 r8:80287e08 r7:eb079e60 r6:853e1280 r5:852cd400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1f9fb0 to 0xeb1f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853dcb80 INFO: task kworker/0:425:4676 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: a802e000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:426:4678 blocked for more than 461 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:426 state:D stack:0 pid:4678 tgid:4678 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb205d84 r8:00000002 r7:60000113 r6:eb205d8c r5:852ce000 r4:852ce000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:852ce000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb205e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853e68c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:852ce000 r7:00000000 r6:83018000 r5:00001000 r4:7f02f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0081000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853a2f8c r4:853a2c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853a2f8c r4:853e1300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:852ce000 r8:853e132c r7:82804d40 r6:dddced80 r5:dddceda0 r4:853e1300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853e1300 r8:80287e08 r7:eb1f9e60 r6:853e1380 r5:852ce000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb205fb0 to 0xeb205ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853dcac0 INFO: task kworker/0:426:4678 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: a802e000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:427:4680 blocked for more than 461 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:427 state:D stack:0 pid:4680 tgid:4680 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb20dd84 r8:00000002 r7:60000113 r6:eb20dd8c r5:852cec00 r4:852cec00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:852cec00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb20de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853e66c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:852cec00 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd75000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853a278c r4:853a2400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853a278c r4:853e1400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:852cec00 r8:853e142c r7:82804d40 r6:dddced80 r5:dddceda0 r4:853e1400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853e1400 r8:80287e08 r7:eb205e60 r6:853e1480 r5:852cec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb20dfb0 to 0xeb20dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853dcac0 INFO: task kworker/0:427:4680 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: a85bf000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:352:4681 blocked for more than 461 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:352 state:D stack:0 pid:4681 tgid:4681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb211d84 r8:00000002 r7:60000113 r6:eb211d8c r5:85348000 r4:85348000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85348000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb211e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853e3d80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85348000 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb065000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852f978c r4:852f9400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:852f978c r4:853e8380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85348000 r8:853e83ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853e8380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853e8380 r8:80287e08 r7:eb1fde60 r6:853e1500 r5:85348000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb211fb0 to 0xeb211ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853e3980 INFO: task kworker/1:352:4681 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: a8a4e000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:353:4683 blocked for more than 461 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:353 state:D stack:0 pid:4683 tgid:4683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb219d84 r8:00000002 r7:60000113 r6:eb219d8c r5:85348c00 r4:85348c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85348c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb219e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853e3e40 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85348c00 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb089000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852f9b8c r4:852f9800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:852f9b8c r4:853e8400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85348c00 r8:853e842c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853e8400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853e8400 r8:80287e08 r7:eb211e60 r6:853e1580 r5:85348c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb219fb0 to 0xeb219ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853e3b40 INFO: task kworker/1:353:4683 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: a8a4e000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:354:4686 blocked for more than 461 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:354 state:D stack:0 pid:4686 tgid:4686 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb235d84 r8:00000002 r7:60000113 r6:eb235d8c r5:85349800 r4:85349800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85349800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb235e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853dcf00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85349800 r7:00000000 r6:83018200 r5:00001000 r4:7f015000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9e3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852fab8c r4:852fa800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:852fab8c r4:853e8480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85349800 r8:853e84ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853e8480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853e8480 r8:80287e08 r7:eb219e60 r6:853e1600 r5:85349800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb235fb0 to 0xeb235ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853e3cc0 INFO: task kworker/1:354:4686 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: a9058000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:355:4688 blocked for more than 461 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:355 state:D stack:0 pid:4688 tgid:4688 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb23dd84 r8:00000002 r7:60000013 r6:eb23dd8c r5:8534bc00 r4:8534bc00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8534bc00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb23de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853e3f80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8534bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0a9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852f9f8c r4:852f9c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:852f9f8c r4:853e8500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8534bc00 r8:853e852c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853e8500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853e8500 r8:80287e08 r7:eb235e60 r6:853e1680 r5:8534bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb23dfb0 to 0xeb23dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853e3cc0 INFO: task kworker/1:355:4688 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: a9058000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:356:4689 blocked for more than 461 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:356 state:D stack:0 pid:4689 tgid:4689 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb241d84 r8:00000002 r7:60000113 r6:eb241d8c r5:8534a400 r4:8534a400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8534a400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb241e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853e3680 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8534a400 r7:00000000 r6:83018200 r5:00001000 r4:7f09d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0d9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852fa38c r4:852fa000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:852fa38c r4:853e8580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8534a400 r8:853e85ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853e8580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853e8580 r8:80287e08 r7:eb235e60 r6:853e1700 r5:8534a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb241fb0 to 0xeb241ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853e3e00 INFO: task kworker/1:356:4689 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: a931f000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:357:4692 blocked for more than 461 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:357 state:D stack:0 pid:4692 tgid:4692 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaef1d84 r8:00000002 r7:60000113 r6:eaef1d8c r5:8534c800 r4:8534c800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8534c800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaef1e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853e3280 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8534c800 r7:00000000 r6:83018200 r5:00001000 r4:7f09f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1d1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852fa78c r4:852fa400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:852fa78c r4:853e8600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8534c800 r8:853e862c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853e8600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853e8600 r8:80287e08 r7:eb235e60 r6:853e1780 r5:8534c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaef1fb0 to 0xeaef1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853e3640 INFO: task kworker/1:357:4692 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: a931f000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:358:4693 blocked for more than 461 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:358 state:D stack:0 pid:4693 tgid:4693 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaf0dd84 r8:00000002 r7:60000013 r6:eaf0dd8c r5:8534d400 r4:8534d400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8534d400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf0de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f22c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8534d400 r7:00000000 r6:83018200 r5:00001000 r4:7f033000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0797000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852faf8c r4:852fac00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:852faf8c r4:853e8680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8534d400 r8:853e86ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853e8680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853e8680 r8:80287e08 r7:eb235e60 r6:853e1800 r5:8534d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf0dfb0 to 0xeaf0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853dc140 INFO: task kworker/1:358:4693 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: a971b000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:359:4695 blocked for more than 461 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:359 state:D stack:0 pid:4695 tgid:4695 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb239d84 r8:00000002 r7:60000013 r6:eb239d8c r5:8534e000 r4:8534e000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8534e000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb239e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f2e80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8534e000 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae55000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852fbb8c r4:852fb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:852fbb8c r4:853e8700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8534e000 r8:853e872c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853e8700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853e8700 r8:80287e08 r7:eaf0de60 r6:853e1880 r5:8534e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb239fb0 to 0xeb239ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853dc140 INFO: task kworker/1:359:4695 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: a971b000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:428:4700 blocked for more than 461 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:428 state:D stack:0 pid:4700 tgid:4700 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb215d84 r8:00000002 r7:60000113 r6:eb215d8c r5:8534ec00 r4:8534ec00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8534ec00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb215e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853e67c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8534ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe0b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853a2b8c r4:853a2800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853a2b8c r4:853e1900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8534ec00 r8:853e192c r7:82804d40 r6:dddced80 r5:dddceda0 r4:853e1900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853e1900 r8:80287e08 r7:eb205e60 r6:853e1980 r5:8534ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb215fb0 to 0xeb215ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853e6900 INFO: task kworker/0:428:4700 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: a997e000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:429:4701 blocked for more than 461 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:429 state:D stack:0 pid:4701 tgid:4701 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaf35d84 r8:00000002 r7:60000113 r6:eaf35d8c r5:8534b000 r4:8534b000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8534b000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf35e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853e69c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8534b000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e010b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853a338c r4:853a3000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853a338c r4:853e1a00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8534b000 r8:853e1a2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:853e1a00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853e1a00 r8:80287e08 r7:eb205e60 r6:853e1a80 r5:8534b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf35fb0 to 0xeaf35ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853e6900 INFO: task kworker/0:429:4701 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: a9c4f000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:430:4703 blocked for more than 461 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:430 state:D stack:0 pid:4703 tgid:4703 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaf85d84 r8:00000002 r7:60000113 r6:eaf85d8c r5:85340000 r4:85340000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85340000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf85e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853e6e40 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85340000 r7:00000000 r6:83018000 r5:00001000 r4:7f037000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9f5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853a3b8c r4:853a3800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853a3b8c r4:853e1b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85340000 r8:853e1b2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:853e1b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853e1b00 r8:80287e08 r7:eaf35e60 r6:853e1b80 r5:85340000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf85fb0 to 0xeaf85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853e6740 INFO: task kworker/0:430:4703 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: a9c4f000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:431:4704 blocked for more than 461 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:431 state:D stack:0 pid:4704 tgid:4704 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eafd1d84 r8:00000002 r7:60000113 r6:eafd1d8c r5:85340c00 r4:85340c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85340c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafd1e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853e6d40 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85340c00 r7:00000000 r6:83018000 r5:00001000 r4:7f035000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e8887000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853a378c r4:853a3400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853a378c r4:853e1c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85340c00 r8:853e1c2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:853e1c00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853e1c00 r8:80287e08 r7:eaf85e60 r6:853e1c80 r5:85340c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeafd1fb0 to 0xeafd1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853e6740 INFO: task kworker/0:431:4704 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: aa000000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:432:4707 blocked for more than 461 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:432 state:D stack:0 pid:4707 tgid:4707 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eafa5d84 r8:00000002 r7:60000113 r6:eafa5d8c r5:85341800 r4:85341800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85341800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafa5e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853fa280 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85341800 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac21000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853b878c r4:853b8400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853b878c r4:853e1d00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85341800 r8:853e1d2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:853e1d00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853e1d00 r8:80287e08 r7:eaf85e60 r6:853e1d80 r5:85341800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeafa5fb0 to 0xeafa5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853e6c40 INFO: task kworker/0:432:4707 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: aa000000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:433:4709 blocked for more than 461 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:433 state:D stack:0 pid:4709 tgid:4709 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb195d84 r8:00000002 r7:60000113 r6:eb195d8c r5:85342400 r4:85342400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85342400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb195e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853e6fc0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85342400 r7:00000000 r6:83018000 r5:00001000 r4:7f039000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaafb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853a3f8c r4:853a3c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853a3f8c r4:853e1e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85342400 r8:853e1e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:853e1e00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853e1e00 r8:80287e08 r7:eafa5e60 r6:853e1e80 r5:85342400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb195fb0 to 0xeb195ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853e6f00 INFO: task kworker/0:433:4709 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: aa426000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:434:4711 blocked for more than 461 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:434 state:D stack:0 pid:4711 tgid:4711 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb249d84 r8:00000002 r7:60000113 r6:eb249d8c r5:85343000 r4:85343000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85343000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb249e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853e3240 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85343000 r7:00000000 r6:83018000 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab47000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:844d538c r4:844d5000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:844d538c r4:853e1f00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85343000 r8:853e1f2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:853e1f00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853e1f00 r8:80287e08 r7:eafa5e60 r6:853e1f80 r5:85343000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb249fb0 to 0xeb249ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853e3540 INFO: task kworker/0:434:4711 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: aa426000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:435:4713 blocked for more than 461 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:435 state:D stack:0 pid:4713 tgid:4713 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb251d84 r8:00000002 r7:60000113 r6:eb251d8c r5:85339800 r4:85339800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85339800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb251e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853fa040 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85339800 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab6f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853b838c r4:853b8000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853b838c r4:853f9000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85339800 r8:853f902c r7:82804d40 r6:dddced80 r5:dddceda0 r4:853f9000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853f9000 r8:80287e08 r7:eafa5e60 r6:853e8800 r5:85339800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb251fb0 to 0xeb251ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853e6040 INFO: task kworker/0:435:4713 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: aab02000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:360:4714 blocked for more than 461 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:360 state:D stack:0 pid:4714 tgid:4714 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb255d84 r8:00000002 r7:60000013 r6:eb255d8c r5:8533e000 r4:8533e000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8533e000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb255e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f2b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8533e000 r7:00000000 r6:83018200 r5:00001000 r4:7f041000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac91000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852fb38c r4:852fb000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:852fb38c r4:853e8780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533e000 r8:853e87ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853e8780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853e8780 r8:80287e08 r7:eb239e60 r6:853e8880 r5:8533e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb255fb0 to 0xeb255ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853f23c0 INFO: task kworker/1:360:4714 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: aab02000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:436:4716 blocked for more than 461 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:436 state:D stack:0 pid:4716 tgid:4716 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb261d84 r8:00000002 r7:60000113 r6:eb261d8c r5:8533c800 r4:8533c800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8533c800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb261e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853dd280 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8533c800 r7:00000000 r6:83018000 r5:00001000 r4:7f067000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfec9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853b938c r4:853b9000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853b938c r4:853f9080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533c800 r8:853f90ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:853f9080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853f9080 r8:80287e08 r7:eafa5e60 r6:853e8900 r5:8533c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb261fb0 to 0xeb261ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853fa100 INFO: task kworker/0:436:4716 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: aab02000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:437:4718 blocked for more than 461 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:437 state:D stack:0 pid:4718 tgid:4718 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb265d84 r8:00000002 r7:60000113 r6:eb265d8c r5:8533bc00 r4:8533bc00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8533bc00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb265e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853dd040 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8533bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f065000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfca1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853b8f8c r4:853b8c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853b8f8c r4:853f9100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:853f912c r7:82804d40 r6:dddced80 r5:dddceda0 r4:853f9100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853f9100 r8:80287e08 r7:eb261e60 r6:853e8980 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb265fb0 to 0xeb265ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853fa100 INFO: task kworker/0:437:4718 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: ab0ae000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:361:4721 blocked for more than 461 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:361 state:D stack:0 pid:4721 tgid:4721 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb269d84 r8:00000002 r7:60000013 r6:eb269d8c r5:8533ec00 r4:8533ec00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8533ec00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb269e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f2c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8533ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eacb1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852fb78c r4:852fb400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:852fb78c r4:853e8a00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533ec00 r8:853e8a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853e8a00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853e8a00 r8:80287e08 r7:eb239e60 r6:853e8a80 r5:8533ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb269fb0 to 0xeb269ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853f2800 INFO: task kworker/1:361:4721 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: ab41b000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:362:4723 blocked for more than 461 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:362 state:D stack:0 pid:4723 tgid:4723 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb26dd84 r8:00000002 r7:60000013 r6:eb26dd8c r5:8532ec00 r4:8532ec00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8532ec00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb26de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f2d00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8532ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae8b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852fbf8c r4:852fbc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:852fbf8c r4:853e8b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8532ec00 r8:853e8b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853e8b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853e8b00 r8:80287e08 r7:eb239e60 r6:853e8b80 r5:8532ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb26dfb0 to 0xeb26dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853f2d00 INFO: task kworker/1:362:4723 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: ab830000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:84ba87c0 r4:85336c00 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:853f2f40 dd20: abe4e000 dfb0b000 00000001 80239b98 7f2f9000 00000001 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb28de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85402400 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85408000 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8530078c r4:85300400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8530078c r4:853e8d00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85408000 r8:853e8d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853e8d00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853e8d00 r8:80287e08 r7:eb271e60 r6:853e8d80 r5:85408000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb28dfb0 to 0xeb28dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85402100 INFO: task kworker/1:364:4727 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:82ac21e4 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) Exception stack(0xe05adfb0 to 0xe05adff8) [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 dd60: 80230ad0 80239bb0 800f0013 ffffffff [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:366:4731 blocked for more than 461 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:366 state:D stack:0 pid:4731 tgid:4731 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb24dd84 r8:00000002 r7:60000013 r6:eb24dd8c r5:85343c00 r4:85343c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85343c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb24de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) dfa0: 00000000 00000000 00000000 00000000 r5:85344800 r4:8291a680 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85402880 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8530138c r4:853e8f80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85344800 r8:853e8fac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853e8f80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853e8f80 r8:80287e08 r7:eb24de60 r6:853f9200 r5:85344800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0f5fb0 to 0xeb0f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85402640 INFO: task kworker/1:367:4733 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: aca8a000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r5:85345400 r4:8291a680 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85402a00 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85402780 INFO: task kworker/1:368:4734 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: aca8a000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r4:00000001 r4:84ba87c0 [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85402c00 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xeb29dfb0 to 0xeb29dff8) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 Exception stack(0xe05adfb0 to 0xe05adff8) Workqueue: events bpf_prog_free_deferred [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2a9fb0 to 0xeb2a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85402980 INFO: task kworker/1:370:4740 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: ad200000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:84ba87c0 task:kworker/1:371 state:D stack:0 pid:4741 tgid:4741 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:00001000 r4:eb10d000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2adfb0 to 0xeb2adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85402800 INFO: task kworker/1:371:4741 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: ad24e000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:372 state:D stack:0 pid:4744 tgid:4744 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2b9e08 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8530278c r4:85302400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8530278c r4:85403200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:852d8000 r8:8540322c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85403200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85403200 r8:80287e08 r7:eb2ade60 r6:853f9480 r5:852d8000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2b9fb0 to 0xeb2b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85402bc0 INFO: task kworker/1:372:4744 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: ad24e000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xe05adfb0 to 0xe05adff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred r4:852dbc00 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r4:00000000 r5:00001000 r4:eb275000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8530478c r4:85304400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: dd20: ad59c000 dfb0b000 00000001 80239b98 7f2f9000 00000001 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 dfa0: 00000000 00000000 00000000 00000000 task:kworker/1:374 state:D stack:0 pid:4746 tgid:4746 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8291a684 r9:eb2c1d84 r8:00000002 r7:60000113 r6:eb2c1d8c r5:852da400 [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85402fc0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:852da400 r7:00000000 r6:83018200 r5:00001000 r4:7f05d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb161000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85302b8c r4:85302800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85302b8c r4:85403300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:852da400 r8:8540332c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85403300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85403300 r8:80287e08 r7:eb2bde60 r6:853f9580 r5:852da400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2c1fb0 to 0xeb2c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85402f00 INFO: task kworker/1:374:4746 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: ad8c6000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:375:4749 blocked for more than 462 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:375 state:D stack:0 pid:4749 tgid:4749 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:85403380 Exception stack(0xeb2cdfb0 to 0xeb2cdff8) r4:853f2340 Call trace: Exception stack(0xe05add28 to 0xe05add70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r5:84be078c r4:84be0400 r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8530338c r4:85303000 r10:61c88647 r9:852dc800 r8:8540342c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe05add28 to 0xe05add70) r5:800f0013 r4:80239bb0 r4:82ac21e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:377:4752 blocked for more than 462 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:377 state:D stack:0 pid:4752 tgid:4752 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb2d9d84 r8:00000002 r7:60000013 r6:eb2d9d8c r5:852dec00 r4:852dec00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:852dec00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2d9e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f4300 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:852dec00 r7:00000000 r6:83018200 r5:00001000 r4:7f063000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb197000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8530378c r4:85303400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8530378c r4:85403480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:852dec00 r8:854034ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85403480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85403480 r8:80287e08 r7:eb2bde60 r6:853f9700 r5:852dec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2d9fb0 to 0xeb2d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853f4040 INFO: task kworker/1:377:4752 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: ae155000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:378:4754 blocked for more than 462 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:378 state:D stack:0 pid:4754 tgid:4754 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb2e1d84 r8:00000002 r7:60000013 r6:eb2e1d8c r5:852de000 r4:852de000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:852de000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2e1e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:379:4757 blocked for more than 462 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:379 state:D stack:0 pid:4757 tgid:4757 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb2e5d84 r8:00000002 r7:60000013 r6:eb2e5d8c r5:852dd400 r4:852dd400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:852dd400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2e5e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f4580 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:852dd400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a3000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1bf000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85303f8c r4:85303c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85303f8c r4:85403580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:852dd400 r8:854035ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85403580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe05add28 to 0xe05add70) dd60: 80230ad0 80239bb0 800f0013 ffffffff r4:82ac21e4 r4:e05addc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:84bbbf00 r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 dfa0: 00000000 00000000 00000000 00000000 INFO: task kworker/1:380:4759 blocked for more than 462 seconds. Workqueue: events bpf_prog_free_deferred r4:85346c00 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8530438c r4:85304000 r7:ddde2d80 r6:83018200 r5:8530438c r4:85403600 r4:85403600 r4:00000001 Exception stack(0xeb2e9fb0 to 0xeb2e9ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe05add28 to 0xe05add70) dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 r4:82ac21e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:00000000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:381:4761 blocked for more than 462 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:381 state:D stack:0 pid:4761 tgid:4761 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb2f5d84 r8:00000002 r7:60000013 r6:eb2f5d8c r5:84898000 r4:84898000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84898000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2f5e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f4940 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84898000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a9000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2f1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85304b8c r4:85304800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85304b8c r4:85403680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84898000 r8:854036ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85403680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85403680 r8:80287e08 r7:eb2bde60 r6:853f9900 r5:84898000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2f5fb0 to 0xeb2f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853f44c0 INFO: task kworker/1:381:4761 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: aee87000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 INFO: task kworker/1:382:4763 blocked for more than 462 seconds. r4:84898c00 [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ead81000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:85403700 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe05add28 to 0xe05add70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) dfa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:383:4764 blocked for more than 462 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:383 state:D stack:0 pid:4764 tgid:4764 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb30dd84 r8:00000002 r7:60000113 r6:eb30dd8c r5:84899800 r4:84899800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84899800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb30de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f4a80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84899800 r7:00000000 r6:83018200 r5:00001000 r4:7f0ab000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2fd000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85304f8c r4:85304c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85304f8c r4:85403780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84899800 r8:854037ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85403780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85403780 r8:80287e08 r7:eb301e60 r6:853f9a00 r5:84899800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb30dfb0 to 0xeb30dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853f49c0 INFO: task kworker/1:383:4764 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: af406000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:438:4769 blocked for more than 462 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:438 state:D stack:0 pid:4769 tgid:4769 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb2ddd84 r8:00000002 r7:60000113 r6:eb2ddd8c r5:8489a400 r4:8489a400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8489a400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2dde08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853dd480 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8489a400 r7:00000000 r6:83018000 r5:00001000 r4:7f069000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853b978c r4:853b9400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853b978c r4:853f9a80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8489a400 r8:853f9aac r7:82804d40 r6:dddced80 r5:dddceda0 r4:853f9a80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853f9a80 r8:80287e08 r7:eb261e60 r6:853f9b00 r5:8489a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2ddfb0 to 0xeb2ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853dd100 INFO: task kworker/0:438:4769 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: af406000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:439:4770 blocked for more than 462 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:439 state:D stack:0 pid:4770 tgid:4770 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb25dd84 r8:00000002 r7:60000113 r6:eb25dd8c r5:8489b000 r4:8489b000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8489b000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb25de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853dd5c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8489b000 r7:00000000 r6:83018000 r5:00001000 r4:7f06b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e04a1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853b9b8c r4:853b9800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853b9b8c r4:853f9b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8489b000 r8:853f9bac r7:82804d40 r6:dddced80 r5:dddceda0 r4:853f9b80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853f9b80 r8:80287e08 r7:eb2dde60 r6:853f9c00 r5:8489b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb25dfb0 to 0xeb25dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853dd100 INFO: task kworker/0:439:4770 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: af5e6000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:8489bc00 r8:853f9cac r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 Exception stack(0xe05adfb0 to 0xe05adff8) r4:84ba87c0 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:8489c800 r8:853f9dac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 r5:800f0013 r4:80239bb0 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:384:4777 blocked for more than 462 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:384 state:D stack:0 pid:4777 tgid:4777 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb0c5d84 r8:00000002 r7:60000113 r6:eb0c5d8c r5:8489d400 r4:8489d400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8489d400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0c5e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85402e40 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8489d400 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead47000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8530538c r4:85305000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8530538c r4:85403800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8489d400 r8:8540382c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85403800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85403800 r8:80287e08 r7:eb301e60 r6:853f9e80 r5:8489d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0c5fb0 to 0xeb0c5ff8) 5fa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xe05add28 to 0xe05add70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-rc7-syzkaller #0 r5:8489e000 r4:8291a680 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xeada9fb0 to 0xeada9ff8) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853dd900 INFO: task kworker/0:442:4778 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: b00a8000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:443:4780 blocked for more than 462 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853ddb80 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:8489ec00 r8:8540002c r7:82804d40 r6:dddced80 r5:dddceda0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: dd20: b0370000 dfb0b000 00000001 80239b98 7f2f9000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eaa2f000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:85400100 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:445:4785 blocked for more than 462 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:445 state:D stack:0 pid:4785 tgid:4785 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb315d84 r8:00000002 r7:60000113 r6:eb315d8c r5:85440c00 r4:85440c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85440c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb315e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853dde80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85440c00 r7:00000000 r6:83018000 r5:00001000 r4:7f077000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa5b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853bb38c r4:853bb000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853bb38c r4:85400200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85440c00 r8:8540022c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85400200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85400200 r8:80287e08 r7:eb311e60 r6:85400280 r5:85440c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb315fb0 to 0xeb315ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853ddb00 INFO: task kworker/0:445:4785 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: b0c91000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:85441800 r8:8540032c r7:82804d40 r6:dddced80 r5:dddceda0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853bb78c r4:853bb400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853bb78c r4:85400400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85442400 r8:8540042c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85400400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85400400 r8:80287e08 r7:eb31de60 r6:85400480 r5:85442400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb319fb0 to 0xeb319ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853ddc80 INFO: task kworker/0:447:4788 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: b0fab000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:448:4790 blocked for more than 462 seconds. Not tainted 6.15.0-rc7-syzkaller #0 [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 dd60: 80230ad0 80239bb0 800f0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:854062c0 INFO: task kworker/0:449:4792 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: b1931000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:450:4795 blocked for more than 462 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:450 state:D stack:0 pid:4795 tgid:4795 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb321d84 r8:00000002 r7:60000113 r6:eb321d8c r5:8540a400 r4:8540a400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8540a400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb321e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:8540a400 r8:8540072c r7:82804d40 r6:dddced80 r5:dddceda0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xe05add28 to 0xe05add70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:451:4796 blocked for more than 462 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:451 state:D stack:0 pid:4796 tgid:4796 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb331d84 r8:00000002 r7:60000013 r6:eb331d8c r5:8540b000 r4:8540b000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8540b000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb331e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85406ac0 r4:00000000 r5:00001000 r4:eade9000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:854bc38c r4:85400780 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xe05add28 to 0xe05add70) r4:82ac21e4 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/1:385:4798 blocked for more than 462 seconds. r10:8291a684 r9:eb32dd84 r8:00000002 r7:60000113 r6:eb32dd8c r5:8540c800 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:8540c800 r8:854039ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 dd20: b257b000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:386:4800 blocked for more than 462 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:386 state:D stack:0 pid:4800 tgid:4800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb335d84 r8:00000002 r7:60000113 r6:eb335d8c r5:8540d400 r4:8540d400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8540d400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb335e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85482fc0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8540d400 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab8b000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85306f8c r4:85306c00 r10:61c88647 r9:8540d400 r8:85403aac r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:82ac21e4 r4:00000000 r5:84be078c r4:84be0400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:8291a684 r9:eb33dd84 r8:00000002 r7:60000113 r6:eb33dd8c r5:8540e000 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854bd38c r4:854bd000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:854bd38c r4:85403b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8540e000 r8:85403bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85403b80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85403b80 r8:80287e08 r7:eb335e60 r6:85403c00 r5:8540e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb33dfb0 to 0xeb33dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8547b280 INFO: task kworker/1:387:4801 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: b2a1f000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:452:4803 blocked for more than 462 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:452 state:D stack:0 pid:4803 tgid:4803 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb345d84 r8:00000002 r7:60000013 r6:eb345d8c r5:8540bc00 r4:8540bc00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854bc78c r4:854bc400 r10:61c88647 r9:8540bc00 r8:8540082c r7:82804d40 r6:dddced80 r5:dddceda0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xe05add28 to 0xe05add70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r5:84be078c r4:84be0400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:453:4806 blocked for more than 462 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:453 state:D stack:0 pid:4806 tgid:4806 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb351d84 r8:00000002 r7:60000113 r6:eb351d8c r5:85408c00 r4:85408c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85408c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb351e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85406e00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854bcf8c r4:854bcc00 r10:61c88647 r9:85408c00 r8:854008ac r7:82804d40 r6:dddced80 r5:dddceda0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfa0: 00000000 00000000 00000000 00000000 INFO: task kworker/0:454:4808 blocked for more than 462 seconds. [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb359e08 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:854bdb8c r4:854bd800 r10:61c88647 r9:8533d400 r8:8540092c r7:82804d40 r6:dddced80 r5:dddceda0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xe05add28 to 0xe05add70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:455:4809 blocked for more than 463 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:455 state:D stack:0 pid:4809 tgid:4809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb35dd84 r8:00000002 r7:60000113 r6:eb35dd8c r5:8540ec00 r4:8540ec00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8540ec00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb35de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85406680 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8540ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f091000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0b5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854bd78c r4:854bd400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854bd78c r4:85400980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8540ec00 r8:854009ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85400980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85400980 r8:80287e08 r7:eb359e60 r6:85403e00 r5:8540ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb35dfb0 to 0xeb35dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85406b80 INFO: task kworker/0:455:4809 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: b32a1000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84bbbf00 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/1:388:4811 blocked for more than 463 seconds. r10:8291a684 r9:eb355d84 r8:00000002 r7:60000013 r6:eb355d8c r5:85448000 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8530638c r4:85306000 r10:61c88647 r9:85448000 r8:85403eac r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: dd20: b34c1000 dfb0b000 00000001 80239b98 7f2f9000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:456:4814 blocked for more than 463 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:456 state:D stack:0 pid:4814 tgid:4814 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb361d84 r8:00000002 r7:60000013 r6:eb361d8c r5:85448c00 r4:85448c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85448c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb361e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85404500 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85448c00 r7:00000000 r6:83018000 r5:00001000 r4:7f09b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb377000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854beb8c r4:854be800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854beb8c r4:85400a00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85448c00 r8:85400a2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85400a00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85400a00 r8:80287e08 r7:eb359e60 r6:85403f80 r5:85448c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb361fb0 to 0xeb361ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854068c0 INFO: task kworker/0:456:4814 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: b3bb9000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:dfd07000 r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-rc7-syzkaller #0 r10:8291a684 r9:eb365d84 r8:00000002 r7:60000113 r6:eb365d8c r5:85449800 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xeb365fb0 to 0xeb365ff8) task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r5:00001000 r4:dfd07000 r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:458:4818 blocked for more than 463 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:458 state:D stack:0 pid:4818 tgid:4818 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb369d84 r8:00000002 r7:60000013 r6:eb369d8c r5:8544a400 r4:8544a400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8544a400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb369e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85404040 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8544a400 r7:00000000 r6:83018000 r5:00001000 r4:7f097000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb223000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854be38c r4:854be000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854be38c r4:85400b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8544a400 r8:85400b2c r7:82804d40 r6:dddced80 r5:dddceda0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:459:4819 blocked for more than 463 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:459 state:D stack:0 pid:4819 tgid:4819 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb375d84 r8:00000002 r7:60000013 r6:eb375d8c r5:8544b000 r4:8544b000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8544b000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb375e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85404340 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8544b000 r7:00000000 r6:83018000 r5:00001000 r4:7f099000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb36b000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854be78c r4:854be400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:85404280 Call trace: dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 r4:00000000 r5:84be078c r4:84be0400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb38f000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xe05add28 to 0xe05add70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:461:4824 blocked for more than 463 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:461 state:D stack:0 pid:4824 tgid:4824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb38dd84 r8:00000002 r7:60000013 r6:eb38dd8c r5:8544c800 r4:8544c800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8544c800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb38de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854045c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8544c800 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb383000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854bef8c r4:854bec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854bef8c r4:85400c80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8544c800 r8:85400cac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85400c80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb399d84 r8:00000002 r7:60000013 r6:eb399d8c r5:8544d400 r4:8544d400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8544d400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb399e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85404840 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8544d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0af000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb39b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854bf78c r4:854bf400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854bf78c r4:85400d00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8544d400 r8:85400d2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85400d00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85400d00 r8:80287e08 r7:eb37de60 r6:8547d280 r5:8544d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb399fb0 to 0xeb399ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85404580 INFO: task kworker/0:462:4826 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Call trace: dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:463:4828 blocked for more than 463 seconds. Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:8544e000 r8:85400dac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 INFO: task kworker/0:464:4830 blocked for more than 463 seconds. r4:8544ec00 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854049c0 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:854bfb8c r4:85400e00 r10:00000000 r9:85400e00 r8:80287e08 r7:eb3a5e60 r6:8547d380 r5:8544ec00 task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:800f0013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:85410c00 r4:8291a680 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:eb3c3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854c038c r4:854c0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854c038c r4:85400e80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85410c00 r8:85400eac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85400e80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85400e80 r8:80287e08 r7:eb3a5e60 r6:8547d400 r5:85410c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3c1fb0 to 0xeb3c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854048c0 INFO: task kworker/0:465:4832 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: b52de000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Not tainted 6.15.0-rc7-syzkaller #0 r4:85412400 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85404d00 r5:854c078c r4:854c0400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:467:4841 blocked for more than 463 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:467 state:D stack:0 pid:4841 tgid:4841 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb3ddd84 r8:00000002 r7:60000113 r6:eb3ddd8c r5:85413000 r4:85413000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85413000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3dde08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r4:00000000 r5:854c0b8c r4:854c0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfa0: 00000000 00000000 00000000 00000000 task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r4:00000000 r5:84be078c r4:84be0400 r4:84bbbf00 Exception stack(0xe05adfb0 to 0xe05adff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r5:85410000 r4:8291a680 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85404ec0 r5:854c0f8c r4:854c0c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854c0f8c r4:8548c000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85410000 r8:8548c02c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8548c000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8548c000 r8:80287e08 r7:eb3dde60 r6:8547d580 r5:85410000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3e1fb0 to 0xeb3e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85404f40 INFO: task kworker/0:468:4842 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: b5c33000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:469:4843 blocked for more than 463 seconds. Not tainted 6.15.0-rc7-syzkaller #0 r10:8291a684 r9:eb3f9d84 r8:00000002 r7:60000113 r6:eb3f9d8c r5:85413c00 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:854c138c r4:854c1000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:8548c100 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:84bbbf00 Exception stack(0xe05adfb0 to 0xe05adff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:470:4844 blocked for more than 463 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:470 state:D stack:0 pid:4844 tgid:4844 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb3fdd84 r8:00000002 r7:60000113 r6:eb3fdd8c r5:85414800 r4:85414800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85414800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3fde08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8478f480 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85414800 r7:00000000 r6:83018000 r5:00001000 r4:7f031000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e07eb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854c178c r4:854c1400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854c178c r4:8548c180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85414800 r8:8548c1ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8548c180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8548c180 r8:80287e08 r7:eb3f9e60 r6:8547d680 r5:85414800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3fdfb0 to 0xeb3fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85489040 INFO: task kworker/0:470:4844 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: b5c33000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xe05adfb0 to 0xe05adff8) INFO: task kworker/0:471:4845 blocked for more than 463 seconds. r5:85415400 r4:8291a680 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85489600 r5:854c1f8c r4:854c1c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854c1f8c r4:8548c200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85415400 r8:8548c22c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8548c200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8548c200 r8:80287e08 r7:eb3fde60 r6:8547d700 r5:85415400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb401fb0 to 0xeb401ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85489040 INFO: task kworker/0:471:4845 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: b662c000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:84bbbf00 Exception stack(0xe05adfb0 to 0xe05adff8) INFO: task kworker/1:389:4847 blocked for more than 463 seconds. Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb3d5d84 r8:00000002 r7:60000013 r6:eb3d5d8c r5:85416000 r4:85416000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85416000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3d5e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854829c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85416000 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaaf1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8530678c r4:85306400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8530678c r4:8547d780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85416000 r8:8547d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8547d780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8547d780 r8:80287e08 r7:eb335e60 r6:8547d800 r5:85416000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:390:4850 blocked for more than 463 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:390 state:D stack:0 pid:4850 tgid:4850 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb339d84 r8:00000002 r7:60000013 r6:eb339d8c r5:85416c00 r4:85416c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85416c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb339e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85482ec0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85416c00 r7:00000000 r6:83018200 r5:00001000 r4:7f037000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85306b8c r4:85306800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85306b8c r4:8547d880 r4:8547d880 9fa0: 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe05add28 to 0xe05add70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xe05adfb0 to 0xe05adff8) INFO: task kworker/1:391:4852 blocked for more than 463 seconds. r5:85411800 r4:8291a680 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:8530778c r4:85307400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:8547d980 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: b662c000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:392:4854 blocked for more than 463 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:392 state:D stack:0 pid:4854 tgid:4854 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb341d84 r8:00000002 r7:60000013 r6:eb341d8c r5:85418000 r4:85418000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85418000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb341e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85482140 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85418000 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac81000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8530738c r4:85307000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8530738c r4:8547da80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85418000 r8:8547daac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8547da80 r10:00000000 r9:8547da80 r8:80287e08 r7:eb405e60 r6:8547db00 r5:85418000 task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:85419800 r4:8291a680 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r9:83018205 r8:85419800 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf21000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85307b8c r4:85307800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85307b8c r4:8547db80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85419800 r8:8547dbac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8547db80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8547db80 r8:80287e08 r7:eb405e60 r6:8547dc00 r5:85419800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb40dfb0 to 0xeb40dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85482080 INFO: task kworker/1:393:4856 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Call trace: Exception stack(0xe05add28 to 0xe05add70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r5:84be078c r4:84be0400 r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8541b000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb415e08 r5:00001000 r4:eaf51000 r5:85307f8c r4:85307c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe05add28 to 0xe05add70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xe05adfb0 to 0xe05adff8) r4:84ba87c0 Workqueue: events bpf_prog_free_deferred r4:85418c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85418c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb419e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85489740 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85418c00 r7:00000000 r6:83018000 r5:00001000 r4:7f041000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaeaf000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854c238c r4:854c2000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854c238c r4:8548c280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85418c00 r8:8548c2ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8548c280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8548c280 r8:80287e08 r7:eb401e60 r6:8547dd80 r5:85418c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb419fb0 to 0xeb419ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85489480 INFO: task kworker/0:472:4858 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: b735e000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 Not tainted 6.15.0-rc7-syzkaller #0 r4:8541bc00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb41de08 r9:83018005 r8:8541bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f065000 r5:854c2b8c r4:854c2800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:854f878c r4:854f8400 r10:61c88647 r9:8541a400 r8:8547deac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853ff300 INFO: task kworker/1:395:4864 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: b7b77000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:396:4865 blocked for more than 463 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:396 state:D stack:0 pid:4865 tgid:4865 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb411d84 r8:00000002 r7:60000113 r6:eb411d8c r5:8541d400 r4:8541d400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8541d400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb411e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853ff5c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8541d400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf71000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8471c38c r4:8471c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8471c38c r4:8547df80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8541d400 r8:8547dfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8547df80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Call trace: dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8291a684 r9:eb409d84 r8:00000002 r7:60000113 r6:eb409d8c r5:8541e000 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:eafc3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854f838c r4:854f8000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:854f838c r4:85486080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8541e000 r8:854860ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85486080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85486080 r8:80287e08 r7:eb421e60 r6:85486100 r5:8541e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb409fb0 to 0xeb409ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853ff6c0 INFO: task kworker/1:397:4867 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: b80d4000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 Exception stack(0xe05adfb0 to 0xe05adff8) INFO: task kworker/1:398:4870 blocked for more than 463 seconds. r4:8541ec00 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853ffa80 r5:854f8b8c r4:854f8800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 Exception stack(0xe05adfb0 to 0xe05adff8) INFO: task kworker/1:399:4872 blocked for more than 463 seconds. r5:8541c800 r4:8291a680 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:854f8f8c r4:854f8c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:85486280 r8:80287e08 r7:eb425e60 r6:85486300 r5:8541c800 INFO: task kworker/1:399:4872 is blocked on a mutex likely owned by task kworker/1:202:3656. dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:400:4874 blocked for more than 463 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:400 state:D stack:0 pid:4874 tgid:4874 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb431d84 r8:00000002 r7:60000113 r6:eb431d8c r5:85420000 r4:85420000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85420000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb431e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853fff00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85420000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb17b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854f978c r4:854f9400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:854f978c r4:85486380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85420000 r8:854863ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85486380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85486380 r8:80287e08 r7:eb42de60 r6:85486400 r5:85420000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb431fb0 to 0xeb431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:853ffa40 Call trace: dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 r4:e05addc0 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r5:85420c00 r4:8291a680 r4:00000000 r4:00000000 r5:854f938c r4:854f9000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:85486480 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:82ac21e4 r4:e05addc0 r5:00001000 r4:dfd07000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:402:4878 blocked for more than 463 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:402 state:D stack:0 pid:4878 tgid:4878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb439d84 r8:00000002 r7:60000013 r6:eb439d8c r5:85421800 r4:85421800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85421800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb439e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853fb040 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85421800 r7:00000000 r6:83018200 r5:00001000 r4:7f055000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb199000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854f9b8c r4:854f9800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:854f9b8c r4:85486580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85421800 r8:854865ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85486580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85486580 r8:80287e08 r7:eb431e60 r6:85486600 r5:85421800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb439fb0 to 0xeb439ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853fb080 INFO: task kworker/1:402:4878 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: b88b5000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:85422400 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb43de08 r5:854fa38c r4:854fa000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:85486680 r8:80287e08 r7:eb439e60 r6:85486700 r5:85422400 task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:474:4881 blocked for more than 463 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:474 state:D stack:0 pid:4881 tgid:4881 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb429d84 r8:00000002 r7:60000013 r6:eb429d8c r5:85423000 r4:85423000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85423000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb429e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85489b00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85423000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa23000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854c278c r4:854c2400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854c278c r4:8548c380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85423000 r8:8548c3ac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:8548c380 r8:80287e08 r7:eb41de60 r6:85486780 r5:85423000 task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r5:84be078c r4:84be0400 r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85423c00 r5:85423c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb441e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853fb380 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85423c00 r7:00000000 r6:83018200 r5:00001000 r4:7f057000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1b5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854f9f8c r4:854f9c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:854f9f8c r4:85486800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85423c00 r8:8548682c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85486800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85486800 r8:80287e08 r7:eb43de60 r6:85486880 r5:85423c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb441fb0 to 0xeb441ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853fb280 INFO: task kworker/1:404:4882 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: b8d70000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:405:4885 blocked for more than 463 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:405 state:D stack:0 pid:4885 tgid:4885 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb445d84 r8:00000002 r7:60000013 r6:eb445d8c r5:85424800 r4:85424800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85424800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb445e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853fb6c0 r5:854fa78c r4:854fa400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85424800 r8:8548692c r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 r4:e05addc0 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84bbbf00 Exception stack(0xe05adfb0 to 0xe05adff8) Not tainted 6.15.0-rc7-syzkaller #0 r4:85425400 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb449e08 r5:00001000 r4:eb2a3000 r5:854fab8c r4:854fa800 r10:61c88647 r9:85425400 r8:85486aac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 Exception stack(0xe05adfb0 to 0xe05adff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r5:85426000 r4:8291a680 r4:00000000 r4:00000000 r5:854fb78c r4:854fb400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853fb4c0 INFO: task kworker/1:407:4888 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: b9690000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:408:4891 blocked for more than 463 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:408 state:D stack:0 pid:4891 tgid:4891 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb44dd84 r8:00000002 r7:60000113 r6:eb44dd8c r5:85426c00 r4:85426c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85426c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb44de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:854faf8c r4:854fac00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:85486a00 dfa0: 00000000 00000000 00000000 00000000 Call trace: dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 r4:e05addc0 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:84ba87c0 Workqueue: events bpf_prog_free_deferred [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r9:83018205 r8:85430000 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 r5:854fb38c r4:854fb000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: ba037000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:410:4895 blocked for more than 463 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:410 state:D stack:0 pid:4895 tgid:4895 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb459d84 r8:00000002 r7:60000013 r6:eb459d8c r5:85430c00 r4:85430c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85430c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb459e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854a1dc0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85430c00 r7:00000000 r6:83018200 r5:00001000 r4:7f02b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00af000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85508f8c r4:85508c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85508f8c r4:85486e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85430c00 r8:85486e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85486e00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85486e00 r8:80287e08 r7:eb451e60 r6:85486e80 r5:85430c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb459fb0 to 0xeb459ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xe05add28 to 0xe05add70) r4:82ac21e4 r4:e05addc0 r5:00001000 r4:dfd07000 r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854fbf8c r4:854fbc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:854fbf8c r4:85486f00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85431800 r8:85486f2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85486f00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85486f00 r8:80287e08 r7:eb459e60 r6:85486f80 r5:85431800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb45dfb0 to 0xeb45dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853fbc80 INFO: task kworker/1:411:4896 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: ba49f000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/0:475:4899 blocked for more than 463 seconds. r4:85432400 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb349e08 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:854c338c r4:854c3000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fa0: 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe05add28 to 0xe05add70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:476:4902 blocked for more than 463 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:476 state:D stack:0 pid:4902 tgid:4902 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb461d84 r8:00000002 r7:60000113 r6:eb461d8c r5:85433000 r4:85433000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85433000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb461e08 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854c2f8c r4:854c2c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85433000 r8:8548c4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8548c480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8548c480 r8:80287e08 r7:eb349e60 r6:853d4080 r5:85433000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb461fb0 to 0xeb461ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85489d40 INFO: task kworker/0:476:4902 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: ba8cd000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:412:4905 blocked for more than 463 seconds. Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3a1e08 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8550838c r4:85508000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:853d4100 r8:80287e08 r7:eb459e60 r6:853d4180 r5:85435400 INFO: task kworker/1:412:4905 is blocked on a mutex likely owned by task kworker/1:202:3656. dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:85433c00 r4:8291a680 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853853c0 r5:854c378c r4:854c3400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe05add28 to 0xe05add70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:478:4908 blocked for more than 463 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:478 state:D stack:0 pid:4908 tgid:4908 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb3c9d84 r8:00000002 r7:60000113 r6:eb3c9d8c r5:85436c00 r4:85436c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85436c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3c9e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85385a40 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85436c00 r7:00000000 r6:83018000 r5:00001000 r4:7f077000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854c478c r4:854c4400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854c478c r4:8548c580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85436c00 r8:8548c5ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8548c580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8548c580 r8:80287e08 r7:eb3ade60 r6:853d4280 r5:85436c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3c9fb0 to 0xeb3c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85385100 INFO: task kworker/0:478:4908 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) dd60: 80230ad0 80239bb0 800f0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:e071b000 r5:854c3b8c r4:854c3800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfa0: 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe05add28 to 0xe05add70) [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:480:4911 blocked for more than 463 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:480 state:D stack:0 pid:4911 tgid:4911 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb475d84 r8:00000002 r7:60000113 r6:eb475d8c r5:85428c00 r4:85428c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85428c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb475e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85385680 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85428c00 r7:00000000 r6:83018000 r5:00001000 r4:7f071000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9e7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854c3f8c r4:854c3c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854c3f8c r4:8548c680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85428c00 r8:8548c6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8548c680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8548c680 r8:80287e08 r7:eb3c9e60 r6:853d4380 r5:85428c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb475fb0 to 0xeb475ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85385400 task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8291a684 r9:eb47dd84 r8:00000002 r7:60000013 r6:eb47dd8c r5:85428000 r4:00000000 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:482:4915 blocked for more than 463 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:482 state:D stack:0 pid:4915 tgid:4915 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb371d84 r8:00000002 r7:60000113 r6:eb371d8c r5:85444800 r4:85444800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85444800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb371e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85385900 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85444800 r7:00000000 r6:83018000 r5:00001000 r4:7f075000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaca9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854c438c r4:854c4000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854c438c r4:8548c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85444800 r8:8548c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8548c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8548c780 r8:80287e08 r7:eb3c9e60 r6:8548c800 r5:85444800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb371fb0 to 0xeb371ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85385500 INFO: task kworker/0:482:4915 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: bb711000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85443000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb481e08 r5:00001000 r4:ead43000 r5:854c4b8c r4:854c4800 r10:61c88647 r9:85443000 r8:8548c8ac r7:82804d40 r6:dddced80 r5:dddceda0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe05add28 to 0xe05add70) [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:85446000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb389e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85385d40 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85446000 r7:00000000 r6:83018000 r5:00001000 r4:7f07b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead5b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854c4f8c r4:854c4c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854c4f8c r4:8548c980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85446000 r8:8548c9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8548c980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8548c980 r8:80287e08 r7:eb481e60 r6:8548ca00 r5:85446000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb389fb0 to 0xeb389ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853858c0 INFO: task kworker/0:484:4920 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: bbd2f000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:485:4923 blocked for more than 463 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:485 state:D stack:0 pid:4923 tgid:4923 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb489d84 r8:00000002 r7:60000013 r6:eb489d8c r5:85446c00 r4:85446c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85446c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb489e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85385e80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85446c00 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead89000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854c538c r4:854c5000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854c538c r4:8548ca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85446c00 r8:8548caac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8548ca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8548ca80 r8:80287e08 r7:eb389e60 r6:8548cb00 r5:85446c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb489fb0 to 0xeb489ff8) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xe05add28 to 0xe05add70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r5:00001000 r4:dfd07000 r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:8548cb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8548cb80 r8:80287e08 r7:eb489e60 r6:8548cc00 r5:85338c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb48dfb0 to 0xeb48dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85385bc0 INFO: task kworker/0:486:4924 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: bc5e9000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:84b28000 r8:8548ccac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xe05add28 to 0xe05add70) r4:82ac21e4 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r4:84bbbf00 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/0:488 state:D stack:0 pid:4928 tgid:4928 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced80 r6:83018000 r5:854c678c r4:8548cd80 r10:00000000 r9:8548cd80 r8:80287e08 r7:eb48de60 r6:8548ce00 r5:84b28c00 r4:853fc080 Call trace: Exception stack(0xe05add28 to 0xe05add70) dd20: bc5e9000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:489:4930 blocked for more than 464 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:489 state:D stack:0 pid:4930 tgid:4930 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb49dd84 r8:00000002 r7:60000013 r6:eb49dd8c r5:84b29800 r4:84b29800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b29800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb49de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853fc040 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb059000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854c5f8c r4:854c5c00 r10:61c88647 r9:84b29800 r8:8548ceac r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: dd20: bc99b000 dfb0b000 00000001 80239b98 7f2f9000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 Exception stack(0xe05adfb0 to 0xe05adff8) Not tainted 6.15.0-rc7-syzkaller #0 r4:84b2a400 [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced80 r6:83018000 r5:854c638c r4:8548cf80 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r5:84be078c r4:84be0400 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:491:4934 blocked for more than 464 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:491 state:D stack:0 pid:4934 tgid:4934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb4a5d84 r8:00000002 r7:60000113 r6:eb4a5d8c r5:84b2b000 r4:84b2b000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b2b000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4a5e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853fc640 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0e1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854c6b8c r4:854c6800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854c6b8c r4:85407080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b2b000 r8:854070ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85407080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85407080 r8:80287e08 r7:eb499e60 r6:85407100 r5:84b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4a5fb0 to 0xeb4a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853fc340 INFO: task kworker/0:491:4934 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: bcd90000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-rc7-syzkaller #0 r10:8291a684 r9:eb4a9d84 r8:00000002 r7:60000113 r6:eb4a9d8c r5:84b2bc00 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:84b2bc00 r8:854071ac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:85407180 r8:80287e08 r7:eb4a5e60 r6:85407200 r5:84b2bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4a9fb0 to 0xeb4a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853fc440 INFO: task kworker/0:492:4936 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: bd1c4000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:85407280 r8:80287e08 r7:eb4a9e60 r6:85407300 r5:84b2c800 r4:853fc5c0 task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: bd1c4000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r4:00000000 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854c738c r4:854c7000 r10:61c88647 r9:84b2d400 r8:854073ac r7:82804d40 r6:dddced80 r5:dddceda0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:82ac21e4 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/0:495:4942 blocked for more than 464 seconds. r5:84b2ec00 r4:8291a680 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:84b2ec00 r8:854074ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85407480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85407480 r8:80287e08 r7:eb4ade60 r6:85407500 r5:84b2ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb495fb0 to 0xeb495ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853fc9c0 INFO: task kworker/0:495:4942 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: bd4c1000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:496:4944 blocked for more than 464 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:496 state:D stack:0 pid:4944 tgid:4944 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb4b9d84 r8:00000002 r7:60000113 r6:eb4b9d8c r5:85460000 r4:00000000 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854c7f8c r4:854c7c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xeb4b9fb0 to 0xeb4b9ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853fca40 INFO: task kworker/0:496:4944 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: bd918000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:497:4947 blocked for more than 464 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854d038c r4:854d0000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xeb4b5fb0 to 0xeb4b5ff8) task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:eb4cb000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: bdcd3000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:499:4949 blocked for more than 464 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:499 state:D stack:0 pid:4949 tgid:4949 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb4d5d84 r8:00000002 r7:60000113 r6:eb4d5d8c r5:85462400 r4:85462400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85462400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4d5e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854971c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85462400 r7:00000000 r6:83018000 r5:00001000 r4:7f099000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4db000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854d0b8c r4:854d0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854d0b8c r4:85407880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85462400 r8:854078ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85407880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85407880 r8:80287e08 r7:eb4bde60 r6:85407900 r5:85462400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4d5fb0 to 0xeb4d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854895c0 INFO: task kworker/0:499:4949 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: be05a000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:500 state:D stack:0 pid:4952 tgid:4952 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb4c9d84 r8:00000002 r7:60000013 r6:eb4c9d8c r5:85463000 r4:85463000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85463000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4c9e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854d0f8c r4:854d0c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xeb4c9fb0 to 0xeb4c9ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xe05add28 to 0xe05add70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/0:501:4954 blocked for more than 464 seconds. [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85497480 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85463c00 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4f3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854d138c r4:854d1000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854d138c r4:85407a80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85463c00 r8:85407aac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85407a80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85407a80 r8:80287e08 r7:eb4c9e60 r6:85407b00 r5:85463c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4d9fb0 to 0xeb4d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85497180 INFO: task kworker/0:501:4954 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: be05a000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-rc7-syzkaller #0 r5:85464800 r4:8291a680 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85497cc0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85464800 r7:00000000 r6:83018000 r5:00001000 r4:7f0ab000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb537000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854d278c r4:854d2400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854d278c r4:85407b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85464800 r8:85407bac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85407b80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85407b80 r8:80287e08 r7:eb4d9e60 r6:85407c00 r5:85464800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4e5fb0 to 0xeb4e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85497280 INFO: task kworker/0:502:4956 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 Exception stack(0xe05add28 to 0xe05add70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:84ba87c0 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb4ff000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:85465400 r8:85407cac r7:82804d40 r6:dddced80 r5:dddceda0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 dd60: 80230ad0 80239bb0 800f0013 ffffffff r4:e05addc0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:504:4959 blocked for more than 464 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:504 state:D stack:0 pid:4959 tgid:4959 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb511d84 r8:00000002 r7:60000013 r6:eb511d8c r5:85466c00 r4:85466c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85466c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb511e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85497840 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85466c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb507000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854d1b8c r4:854d1800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:85497780 Call trace: dd20: be9b2000 dfb0b000 00000001 80239b98 7f2f9000 00000001 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb515d84 r8:00000002 r7:60000013 r6:eb515d8c r5:85468c00 r4:85468c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85468c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb515e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85497780 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85468c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a7000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb523000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854d1f8c r4:854d1c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854d1f8c r4:85407e80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85468c00 r8:85407eac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85407e80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85407e80 r8:80287e08 r7:eb4e5e60 r6:85407f00 r5:85468c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb515fb0 to 0xeb515ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854976c0 INFO: task kworker/0:505:4961 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: be9b2000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84bbbf00 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854d238c r4:854d2000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854d238c r4:85407f80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85469800 r8:85407fac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85407f80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85407f80 r8:80287e08 r7:eb4e5e60 r6:8549c000 r5:85469800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb52dfb0 to 0xeb52dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854979c0 INFO: task kworker/0:506:4964 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: bf351000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:84ba87c0 Workqueue: events bpf_prog_free_deferred [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb54dd84 r8:00000002 r7:60000013 r6:eb54dd8c r5:85429800 r4:85429800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85429800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb54de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854a00c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85429800 r7:00000000 r6:83018000 r5:00001000 r4:7f0af000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb553000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854d2f8c r4:854d2c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854d2f8c r4:8549c080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85429800 r8:8549c0ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8549c080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8549c080 r8:80287e08 r7:eb4e5e60 r6:853d4480 r5:85429800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb54dfb0 to 0xeb54dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85497d40 INFO: task kworker/0:507:4967 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: bf351000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd60: 80230ad0 80239bb0 800f0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r5:84be078c r4:84be0400 r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:84ba87c0 Workqueue: events bpf_prog_free_deferred [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:8546a400 r8:8549c12c r7:82804d40 r6:dddced80 r5:dddceda0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe05add28 to 0xe05add70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:8542d400 r4:8291a680 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xeb561fb0 to 0xeb561ff8) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854a1440 INFO: task kworker/1:413:4971 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: bf72b000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:509:4972 blocked for more than 464 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:509 state:D stack:0 pid:4972 tgid:4972 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb56dd84 r8:00000002 r7:60000013 r6:eb56dd8c r5:8542e000 r4:8542e000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8542e000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb56de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854a0300 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8542e000 r7:00000000 r6:83018000 r5:00001000 r4:7f0b1000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb563000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854d338c r4:854d3000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854d338c r4:8549c200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8542e000 r8:8549c22c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8549c200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8549c200 r8:80287e08 r7:eb54de60 r6:853d4600 r5:8542e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb56dfb0 to 0xeb56dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Call trace: Exception stack(0xe05add28 to 0xe05add70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:84ba87c0 Workqueue: events bpf_prog_free_deferred r5:8542c800 r4:8291a680 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854a0540 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:8542c800 r8:8549c2ac r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xeb575fb0 to 0xeb575ff8) task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:511:4977 blocked for more than 464 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:511 state:D stack:0 pid:4977 tgid:4977 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb2b1d84 r8:00000002 r7:60000113 r6:eb2b1d8c r5:8542a400 r4:8542a400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8542a400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2b1e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854a0440 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8542a400 r7:00000000 r6:83018000 r5:00001000 r4:7f0b3000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb577000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854d378c r4:854d3400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854d378c r4:8549c300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8542a400 r8:8549c32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8549c300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8549c300 r8:80287e08 r7:eb575e60 r6:853d4700 r5:8542a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2b1fb0 to 0xeb2b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854a0240 INFO: task kworker/0:511:4977 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 dd20: c0062000 dfb0b000 00000001 80239b98 7f2f9000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:84ba87c0 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eab73000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:8542ec00 r8:853d47ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: c0062000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:512:4982 blocked for more than 464 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:512 state:D stack:0 pid:4982 tgid:4982 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb591d84 r8:00000002 r7:60000113 r6:eb591d8c r5:8542bc00 r4:8542bc00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8542bc00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb591e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854a1fc0 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8550938c r4:85509000 r10:61c88647 r9:8542bc00 r8:8549c3ac r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xeb591fb0 to 0xeb591ff8) task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xe05adfb0 to 0xe05adff8) Not tainted 6.15.0-rc7-syzkaller #0 r4:85436000 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854a0e00 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:8549c400 Exception stack(0xeb599fb0 to 0xeb599ff8) task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:514:4984 blocked for more than 464 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:514 state:D stack:0 pid:4984 tgid:4984 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb59dd84 r8:00000002 r7:60000113 r6:eb59dd8c r5:8542b000 r4:8542b000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8542b000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb59de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854a0740 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8542b000 r7:00000000 r6:83018000 r5:00001000 r4:7f02f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9c5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854d3f8c r4:854d3c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854d3f8c r4:8549c480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8542b000 r8:8549c4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8549c480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8549c480 r8:80287e08 r7:eb599e60 r6:853d4980 r5:8542b000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:84ba87c0 Workqueue: events bpf_prog_free_deferred [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:85438000 r8:853d4a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: dd20: c09a1000 dfb0b000 00000001 80239b98 7f2f9000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 Exception stack(0xe05adfb0 to 0xe05adff8) Not tainted 6.15.0-rc7-syzkaller #0 r5:85439800 r4:8291a680 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:eb1b7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854dc38c r4:854dc000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854dc38c r4:8549c500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85439800 r8:8549c52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8549c500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8549c500 r8:80287e08 r7:eb599e60 r6:853d4b00 r5:85439800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5a9fb0 to 0xeb5a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854a05c0 INFO: task kworker/0:515:4988 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: c0bb3000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:416:4990 blocked for more than 464 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:416 state:D stack:0 pid:4990 tgid:4990 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb5add84 r8:00000002 r7:60000013 r6:eb5add8c r5:85438c00 r4:85438c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85438c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5ade08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854b2500 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85438c00 r7:00000000 r6:83018200 r5:00001000 r4:7f037000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8550a38c r4:8550a000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85438c00 r8:853d4bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: dd20: c0bb3000 dfb0b000 00000001 80239b98 7f2f9000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853d4c80 r8:80287e08 r7:eb5ade60 r6:853d4d00 r5:8543a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5b1fb0 to 0xeb5b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854b2100 INFO: task kworker/1:417:4992 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: c1233000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:418:4995 blocked for more than 464 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:418 state:D stack:0 pid:4995 tgid:4995 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb5b5d84 r8:00000002 r7:60000013 r6:eb5b5d8c r5:8543bc00 r4:8543bc00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8543bc00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5b5e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854b2bc0 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:8550af8c r4:853d4d80 r10:00000000 r9:853d4d80 r8:80287e08 r7:eb5ade60 r6:853d4e00 r5:8543bc00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xe05add28 to 0xe05add70) r4:82ac21e4 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xe05adfb0 to 0xe05adff8) Not tainted 6.15.0-rc7-syzkaller #0 r4:8543c800 [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eae9f000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:853d4e80 Exception stack(0xeb5b9fb0 to 0xeb5b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854b2040 INFO: task kworker/1:419:4996 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: c177d000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:420:4999 blocked for more than 464 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:420 state:D stack:0 pid:4999 tgid:4999 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb5c1d84 r8:00000002 r7:60000113 r6:eb5c1d8c r5:8543d400 r4:8543d400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8543d400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8550ab8c r4:8550a800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:853d4f80 r8:80287e08 r7:eb5b5e60 r6:854b5000 r5:8543d400 task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r5:00001000 r4:dfd07000 r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:eb101000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:8543ec00 r8:854b50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: c177d000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:422:5003 blocked for more than 464 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:422 state:D stack:0 pid:5003 tgid:5003 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb541d84 r8:00000002 r7:60000013 r6:eb541d8c r5:8546b000 r4:8546b000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8546b000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb541e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854b2dc0 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8550b38c r4:8550b000 r7:ddde2d80 r6:83018200 r5:8550b38c r4:854b5180 r10:00000000 r9:854b5180 r8:80287e08 r7:eb5bde60 r6:8549c580 r5:8546b000 r4:854b27c0 Call trace: dd20: c1d71000 dfb0b000 00000001 80239b98 7f2f9000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eafc9000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:854b5200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854b5200 r8:80287e08 r7:eb5bde60 r6:8549c600 r5:8546bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4fdfb0 to 0xeb4fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854b2e80 INFO: task kworker/1:423:5004 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: c1d71000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:424:5007 blocked for more than 464 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:424 state:D stack:0 pid:5007 tgid:5007 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb5cdd84 r8:00000002 r7:60000013 r6:eb5cdd8c r5:8546c800 r4:8546c800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8546c800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854b3300 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xe05add28 to 0xe05add70) [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8550bf8c r4:8550bc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8550bf8c r4:854b5300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8546e000 r8:854b532c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854b5300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854b5300 r8:80287e08 r7:eb5cde60 r6:8549c700 r5:8546e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5d5fb0 to 0xeb5d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854b3080 INFO: task kworker/1:425:5009 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: c21fd000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:426:5011 blocked for more than 464 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:426 state:D stack:0 pid:5011 tgid:5011 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb5ddd84 r8:00000002 r7:60000013 r6:eb5ddd8c r5:85468000 r4:85468000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85468000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5dde08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854b35c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85468000 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb207000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8551478c r4:85514400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85468000 r8:854b53ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xeb5ddfb0 to 0xeb5ddff8) task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 dd60: 80230ad0 80239bb0 800f0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r5:84be078c r4:84be0400 r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:84ba87c0 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:8546d400 r8:854b542c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: c2b30000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:428:5016 blocked for more than 464 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:428 state:D stack:0 pid:5016 tgid:5016 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb5d9d84 r8:00000002 r7:60000013 r6:eb5d9d8c r5:8543b000 r4:8543b000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8543b000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5d9e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854b3700 r4:00000000 r5:00001000 r4:eb273000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:85514b8c r4:854b5480 r10:00000000 r9:854b5480 r8:80287e08 r7:eb5dde60 r6:854b5500 r5:8543b000 task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 Not tainted 6.15.0-rc7-syzkaller #0 r10:8291a684 r9:eb5c9d84 r8:00000002 r7:60000113 r6:eb5c9d8c r5:84b2e000 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5c9e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854b3f00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b2e000 r7:00000000 r6:83018200 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb603000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85515b8c r4:85515800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85515b8c r4:854b5580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b2e000 r8:854b55ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854b5580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854b5580 r8:80287e08 r7:eb5d9e60 r6:854b5600 r5:84b2e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5c9fb0 to 0xeb5c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854b3680 INFO: task kworker/1:429:5018 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: c2b30000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:516:5020 blocked for more than 464 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:516 state:D stack:0 pid:5020 tgid:5020 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb5c5d84 r8:00000002 r7:60000113 r6:eb5c5d8c r5:85466000 r4:85466000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85466000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5c5e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854a0a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85466000 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:8546ec00 r4:8291a680 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854b3a80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8546ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f055000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2fb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85514f8c r4:85514c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85514f8c r4:854b5680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8546ec00 r8:854b56ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854b5680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854b5680 r8:80287e08 r7:eb5c9e60 r6:8549c980 r5:8546ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5e5fb0 to 0xeb5e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854b3880 INFO: task kworker/1:430:5022 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: c324e000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:84ba87c0 Workqueue: events bpf_prog_free_deferred [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854ad380 r5:854dd38c r4:854dd000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:8549ca00 r8:80287e08 r7:eb5c5e60 r6:8549ca80 r5:84b48000 r4:854a0e80 Call trace: Exception stack(0xe05add28 to 0xe05add70) [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5f1e08 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: c3521000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:431:5026 blocked for more than 464 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:431 state:D stack:0 pid:5026 tgid:5026 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb5f5d84 r8:00000002 r7:60000113 r6:eb5f5d8c r5:84b49800 r4:84b49800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b49800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5f5e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854b3640 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b49800 r7:00000000 r6:83018200 r5:00001000 r4:7f05f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb617000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8551638c r4:85516000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8551638c r4:854b5700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b49800 r8:854b572c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854b5700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854b5700 r8:80287e08 r7:eb5c9e60 r6:8549cc00 r5:84b49800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5f5fb0 to 0xeb5f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854b3980 INFO: task kworker/1:431:5026 is blocked on a mutex likely owned by task kworker/1:202:3656. Call trace: Exception stack(0xe05add28 to 0xe05add70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r9:83018005 r8:84b4a400 r7:00000000 r6:83018000 r5:00001000 r4:7f059000 r5:8551578c r4:85515400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:8549cc80 r8:80287e08 r7:eb5ede60 r6:8549cd00 r5:84b4a400 task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r4:84b4b000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b4b000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5f9e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854b39c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b4b000 r7:00000000 r6:83018200 r5:00001000 r4:7f05d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb60b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85515f8c r4:85515c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85515f8c r4:854b5780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b4b000 r8:854b57ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854b5780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854b5780 r8:80287e08 r7:eb5f5e60 r6:8549cd80 r5:84b4b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5f9fb0 to 0xeb5f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854b3cc0 INFO: task kworker/1:432:5031 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: c3ac9000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) INFO: task kworker/0:520:5033 blocked for more than 464 seconds. r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb621e08 r5:854dcf8c r4:854dcc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854dcf8c r4:8549ce00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b4c800 r8:8549ce2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8549ce00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8549ce00 r8:80287e08 r7:eb5ede60 r6:8549ce80 r5:84b4c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb621fb0 to 0xeb621ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854a82c0 INFO: task kworker/0:520:5033 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: c3e79000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:433:5035 blocked for more than 464 seconds. Not tainted 6.15.0-rc7-syzkaller #0 Workqueue: events bpf_prog_free_deferred [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 r5:855e978c r4:855e9400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:854b5800 r8:80287e08 r7:eb5f5e60 r6:8549cf00 r5:84b4d400 r4:854b3f80 Call trace: dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 r4:e05addc0 r5:00001000 r4:dfd07000 r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:84b4e000 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 r5:8551678c r4:85516400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8551678c r4:854b5880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b4e000 r8:854b58ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854b5880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854b5880 r8:80287e08 r7:eb625e60 r6:8549cf80 r5:84b4e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb631fb0 to 0xeb631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854b2cc0 INFO: task kworker/1:434:5036 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: c42e0000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Not tainted 6.15.0-rc7-syzkaller #0 r5:84b4ec00 r4:8291a680 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854ad500 r5:854dd78c r4:854dd400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84b4ec00 r8:854ab02c r7:82804d40 r6:dddced80 r5:dddceda0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 r4:e05addc0 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:84ba87c0 task:kworker/0:522 state:D stack:0 pid:5043 tgid:5043 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb395e08 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:854de78c r4:854de400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854de78c r4:854ab100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b4bc00 r8:854ab12c r7:82804d40 r6:dddced80 r5:dddceda0 r4:854ab100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854ab100 r8:80287e08 r7:eb601e60 r6:854ab180 r5:84b4bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb395fb0 to 0xeb395ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854ad300 INFO: task kworker/0:522:5043 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: c444f000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:523:5044 blocked for more than 464 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:523 state:D stack:0 pid:5044 tgid:5044 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb615d84 r8:00000002 r7:60000113 r6:eb615d8c r5:85538000 r4:85538000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85538000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb615e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854ad700 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85538000 r7:00000000 r6:83018000 r5:00001000 r4:7f069000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e052b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854ddb8c r4:854dd800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854ddb8c r4:854ab200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85538000 r8:854ab22c r7:82804d40 r6:dddced80 r5:dddceda0 r4:854ab200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854ab200 r8:80287e08 r7:eb395e60 r6:854ab280 r5:85538000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb615fb0 to 0xeb615ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854ad300 INFO: task kworker/0:523:5044 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: c47c7000 dfb0b000 00000001 80239b98 7f2f9000 00000001 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:84ba87c0 task:kworker/0:524 state:D stack:0 pid:5046 tgid:5046 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4d1e08 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:854ddf8c r4:854ddc00 r10:61c88647 r9:85538c00 r8:854ab32c r7:82804d40 r6:dddced80 r5:dddceda0 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854ad580 INFO: task kworker/0:524:5046 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: c4a72000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:435:5047 blocked for more than 464 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:435 state:D stack:0 pid:5047 tgid:5047 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb4edd84 r8:00000002 r7:60000113 r6:eb4edd8c r5:85539800 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r9:83018205 r8:85539800 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 r5:85516f8c r4:85516c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85539800 r8:854b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xe05add28 to 0xe05add70) r4:82ac21e4 r4:e05addc0 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84bbbf00 Exception stack(0xe05adfb0 to 0xe05adff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r5:8553a400 r4:8291a680 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854adac0 r5:854de38c r4:854de000 r7:dddced80 r6:83018000 r5:854de38c r4:854ab480 r4:00000001 r4:854ad8c0 Workqueue: events bpf_prog_free_deferred dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84ba87c0 Workqueue: events bpf_prog_free_deferred r4:85532400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85532400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb50de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854adec0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85532400 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854deb8c r4:854de800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854deb8c r4:854ab580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85532400 r8:854ab5ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:854ab580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854ab580 r8:80287e08 r7:eb395e60 r6:854b5980 r5:85532400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb50dfb0 to 0xeb50dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854adb40 INFO: task kworker/0:526:5052 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: c4e51000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:436:5054 blocked for more than 464 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:436 state:D stack:0 pid:5054 tgid:5054 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb4e1d84 r8:00000002 r7:60000113 r6:eb4e1d8c r5:85533000 r4:85533000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85533000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4e1e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r4:00000000 r5:8551738c r4:85517000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:854b5a00 1fa0: 00000000 00000000 00000000 00000000 task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Not tainted 6.15.0-rc7-syzkaller #0 r4:85534800 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb53de08 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:854df38c r4:854df000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:854ab600 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: c5428000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:528:5057 blocked for more than 465 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:528 state:D stack:0 pid:5057 tgid:5057 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb549d84 r8:00000002 r7:60000113 r6:eb549d8c r5:85535400 [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ead71000 r5:854def8c r4:854dec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85535400 r8:854ab6ac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 dd60: 80230ad0 80239bb0 800f0013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:529:5060 blocked for more than 465 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:529 state:D stack:0 pid:5060 tgid:5060 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb55dd84 r8:00000002 r7:60000113 r6:eb55dd8c r5:85536c00 r4:85536c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85536c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb55de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85573300 r9:83018005 r8:85536c00 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 r5:854dff8c r4:854dfc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:854ab700 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe05add28 to 0xe05add70) r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:530:5061 blocked for more than 465 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:530 state:D stack:0 pid:5061 tgid:5061 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb569d84 r8:00000002 r7:60000013 r6:eb569d8c r5:85530000 r4:85530000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85530000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:854df78c r4:854df400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854df78c r4:854ab780 r10:00000000 r9:854ab780 r8:80287e08 r7:eb55de60 r6:854b5c80 r5:85530000 INFO: task kworker/0:530:5061 is blocked on a mutex likely owned by task kworker/1:202:3656. dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 r4:e05addc0 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84bbbf00 Exception stack(0xe05adfb0 to 0xe05adff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:85533c00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb589e08 r9:83018005 r8:85533c00 r7:00000000 r6:83018000 r5:00001000 r4:7f07b000 r5:854dfb8c r4:854df800 r10:61c88647 r9:85533c00 r8:854ab82c r7:82804d40 r6:dddced80 r5:dddceda0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xe05adfb0 to 0xe05adff8) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:532:5065 blocked for more than 465 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:532 state:D stack:0 pid:5065 tgid:5065 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb63dd84 r8:00000002 r7:60000013 r6:eb63dd8c r5:85530c00 r4:85530c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85530c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb63de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85573880 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85530c00 r7:00000000 r6:83018000 r5:00001000 r4:7f087000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb3b7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854ecb8c r4:854ec800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854ecb8c r4:854ab880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85530c00 r8:854ab8ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:854ab880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854ab880 r8:80287e08 r7:eb55de60 r6:854b5d80 r5:85530c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb63dfb0 to 0xeb63dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85573180 INFO: task kworker/0:532:5065 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 dd60: 80230ad0 80239bb0 800f0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:85531800 r7:00000000 r6:83018000 r5:00001000 r4:7f07f000 r5:844d5f8c r4:844d5c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb649e08 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:854ab980 r8:80287e08 r7:eb63de60 r6:854b5e80 r5:85536000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb649fb0 to 0xeb649ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:855733c0 INFO: task kworker/0:534:5069 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: c5e3c000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:535:5071 blocked for more than 465 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:535 state:D stack:0 pid:5071 tgid:5071 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb64dd84 r8:00000002 r7:60000113 r6:eb64dd8c r5:8543e000 r4:8543e000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8543e000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb64de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85573780 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8543e000 r7:00000000 r6:83018000 r5:00001000 r4:7f085000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb385000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854ec78c r4:854ec400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854ec78c r4:854aba00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8543e000 r8:854aba2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:854aba00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854aba00 r8:80287e08 r7:eb63de60 r6:854b5f00 r5:8543e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb64dfb0 to 0xeb64dff8) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xe05adfb0 to 0xe05adff8) INFO: task kworker/1:437:5073 blocked for more than 465 seconds. task:kworker/1:437 state:D stack:0 pid:5073 tgid:5073 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb641d84 r8:00000002 r7:60000113 r6:eb641d8c r5:85540000 r4:85540000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85540000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb641e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8557b300 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85540000 r7:00000000 r6:83018200 r5:00001000 r4:7f089000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb46f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854ecf8c r4:854ecc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:854ecf8c r4:854b5f80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85540000 r8:854b5fac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854b5f80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854b5f80 r8:80287e08 r7:eb625e60 r6:8557d000 r5:85540000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb641fb0 to 0xeb641ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8557b100 INFO: task kworker/1:437:5073 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: c610b000 dfb0b000 00000001 80239b98 7f2f9000 00000001 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/0:536:5076 blocked for more than 465 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:536 state:D stack:0 pid:5076 tgid:5076 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb651d84 r8:00000002 r7:60000113 r6:eb651d8c r5:85540c00 r4:85540c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85540c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb651e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85573c00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85540c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb483000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854ed38c r4:854ed000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854ed38c r4:854aba80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85540c00 r8:854abaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:854aba80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854aba80 r8:80287e08 r7:eb63de60 r6:8557d080 r5:85540c00 task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 task:kworker/1:438 state:D stack:0 pid:5078 tgid:5078 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:85541800 [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8551778c r4:85517400 r7:ddde2d80 r6:83018200 r5:8551778c r4:8557d100 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Call trace: r4:00000000 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r4:00000000 r5:00001000 r4:dfd07000 r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:537:5079 blocked for more than 465 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:537 state:D stack:0 pid:5079 tgid:5079 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb659d84 r8:00000002 r7:60000113 r6:eb659d8c r5:85542400 r4:85542400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85542400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb659e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85573e00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85542400 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb503000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854ed78c r4:854ed400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854ed78c r4:854abb00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85542400 r8:854abb2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:854abb00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854abb00 r8:80287e08 r7:eb651e60 r6:8557d200 r5:85542400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb659fb0 to 0xeb659ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85573a80 INFO: task kworker/0:537:5079 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: c690e000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 Not tainted 6.15.0-rc7-syzkaller #0 r5:85544800 r4:8291a680 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85590080 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85544800 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5a3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8471cb8c r4:8471c800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8471cb8c r4:8557d280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85544800 r8:8557d2ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8557d280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8557d280 r8:80287e08 r7:eb625e60 r6:8557d300 r5:85544800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb665fb0 to 0xeb665ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8557b700 INFO: task kworker/1:439:5084 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: c690e000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 INFO: task kworker/0:538:5085 blocked for more than 465 seconds. Workqueue: events bpf_prog_free_deferred r5:85545400 r4:8291a680 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb669e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85573f00 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:854edb8c r4:854ed800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854edb8c r4:854abb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85545400 r8:854abbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:854abb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854abb80 r8:80287e08 r7:eb659e60 r6:8557d380 r5:85545400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb669fb0 to 0xeb669ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85573c80 INFO: task kworker/0:538:5085 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: c6bb5000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:539:5086 blocked for more than 465 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:539 state:D stack:0 pid:5086 tgid:5086 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb66dd84 r8:00000002 r7:60000113 r6:eb66dd8c r5:85546000 r4:85546000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85546000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb66de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85573380 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85546000 r7:00000000 r6:83018000 r5:00001000 r4:7f093000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb539000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854edf8c r4:854edc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854edf8c r4:854abc00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85546000 r8:854abc2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:854abc00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854abc00 r8:80287e08 r7:eb669e60 r6:8557d400 r5:85546000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb66dfb0 to 0xeb66dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85573d00 INFO: task kworker/0:539:5086 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: c6bb5000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xe05adfb0 to 0xe05adff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Not tainted 6.15.0-rc7-syzkaller #0 r10:8291a684 r9:eb679d84 r8:00000002 r7:60000113 r6:eb679d8c r5:85543c00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb679e08 r9:83018005 r8:85543c00 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 r5:854f078c r4:854f0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:854abc80 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/0:540:5088 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: c6bb5000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:541:5090 blocked for more than 465 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:541 state:D stack:0 pid:5090 tgid:5090 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb681d84 r8:00000002 r7:60000113 r6:eb681d8c r5:855a8000 r4:855a8000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855a8000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb681e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:00001000 r4:eb579000 r5:854ee38c r4:854ee000 r10:61c88647 r9:855a8000 r8:854abd2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85573e80 Call trace: Exception stack(0xe05add28 to 0xe05add70) r5:800f0013 r4:80239bb0 r4:e05addc0 r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 task:kworker/0:542 state:D stack:0 pid:5091 tgid:5091 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:855a8c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb68de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854addc0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:855a8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f097000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb683000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854ee78c r4:854ee400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854ee78c r4:854abd80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855a8c00 r8:854abdac r7:82804d40 r6:dddced80 r5:dddceda0 r4:854abd80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854abd80 r8:80287e08 r7:eb679e60 r6:8557d580 r5:855a8c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb68dfb0 to 0xeb68dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854ad840 INFO: task kworker/0:542:5091 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: c6f0d000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xe05adfb0 to 0xe05adff8) r4:84ba87c0 task:kworker/0:543 state:D stack:0 pid:5093 tgid:5093 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb69de08 r5:00001000 r4:eb693000 r5:854eeb8c r4:854ee800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred Exception stack(0xe05add28 to 0xe05add70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.15.0-rc7-syzkaller #0 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb6a5d84 r8:00000002 r7:60000113 r6:eb6a5d8c r5:855abc00 r4:855abc00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855abc00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6a5e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8557c340 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:855abc00 r7:00000000 r6:83018000 r5:00001000 r4:7f09b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb6a7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854eef8c r4:854eec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854eef8c r4:854abe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855abc00 r8:854abeac r7:82804d40 r6:dddced80 r5:dddceda0 r4:854abe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854abe80 r8:80287e08 r7:eb679e60 r6:8557d680 r5:855abc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6a5fb0 to 0xeb6a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8557c100 INFO: task kworker/0:544:5095 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: c7662000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:855ab000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6bde08 r5:00001000 r4:eb6b3000 r5:854ef38c r4:854ef000 r10:61c88647 r9:855ab000 r8:854abfac r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: c7662000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:546:5099 blocked for more than 465 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:546 state:D stack:0 pid:5099 tgid:5099 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb6c9d84 r8:00000002 r7:60000013 r6:eb6c9d8c r5:855ac800 r4:855ac800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855ac800 r4:8291a680 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6c9e08 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8557c5c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:855ac800 r7:00000000 r6:83018000 r5:00001000 r4:7f09f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb6bf000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854ef78c r4:854ef400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854ef78c r4:854abf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855ac800 r8:854abf2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:854abf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854abf00 r8:80287e08 r7:eb679e60 r6:8557d780 r5:855ac800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6c9fb0 to 0xeb6c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8557c500 INFO: task kworker/0:546:5099 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: c7ab1000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r5:84be078c r4:84be0400 r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r5:8553d400 r4:8291a680 r4:00000000 r4:00000000 r5:854efb8c r4:854ef800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:8553d400 r8:8558402c r7:82804d40 r6:dddced80 r5:dddceda0 r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/0:547:5101 is blocked on a mutex likely owned by task kworker/1:202:3656. r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: c7ab1000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:548:5105 blocked for more than 465 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:548 state:D stack:0 pid:5105 tgid:5105 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb6cdd84 r8:00000002 r7:60000113 r6:eb6cdd8c r5:8553e000 r4:8553e000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8553e000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6cde08 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:854eff8c r4:854efc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:85584100 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb61de08 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:854f038c r4:854f0000 r10:61c88647 r9:8553ec00 r8:8558422c r7:82804d40 r6:dddced80 r5:dddceda0 INFO: task kworker/0:549:5106 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: c7d6a000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:550:5109 blocked for more than 465 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:550 state:D stack:0 pid:5109 tgid:5109 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb62dd84 r8:00000002 r7:60000013 r6:eb62dd8c r5:8553bc00 r4:8553bc00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8553bc00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb62de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8557cc80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8553bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000 r5:854f0b8c r4:854f0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:8553bc00 r8:8558432c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:85584300 r8:80287e08 r7:eb679e60 r6:85584380 r5:8553bc00 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 r4:00000000 r5:00001000 r4:dfd07000 r4:84bbbf00 Exception stack(0xe05adfb0 to 0xe05adff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb655d84 r8:00000002 r7:60000113 r6:eb655d8c r5:8553c800 r4:8553c800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8553c800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb655e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8557ce40 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8553c800 r7:00000000 r6:83018000 r5:00001000 r4:7f02f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab55000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854f0f8c r4:854f0c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854f0f8c r4:85584400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8553c800 r8:8558442c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85584400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85584400 r8:80287e08 r7:eb62de60 r6:85584480 r5:8553c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb655fb0 to 0xeb655ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8557cb00 INFO: task kworker/0:551:5110 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: c82c2000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:84ba87c0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:854f138c r4:854f1000 r10:61c88647 r9:8553b000 r8:8558452c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85584500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85584500 r8:80287e08 r7:eb655e60 r6:85584580 r5:8553b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6d9fb0 to 0xeb6d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8557ccc0 INFO: task kworker/0:552:5112 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: c8604000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:553:5114 blocked for more than 465 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Call trace: r4:855b0000 [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:854f178c r4:854f1400 r10:61c88647 r9:855b0000 r8:8558462c r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xeb6e1fb0 to 0xeb6e1ff8) task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: c8604000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 r5:84be078c r4:84be0400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-rc7-syzkaller #0 r10:8291a684 r9:eb6e5d84 r8:00000002 r7:60000113 r6:eb6e5d8c r5:855b0c00 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:854f1b8c r4:854f1800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854f1b8c r4:85584700 r4:85584700 5fa0: 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 dd60: 80230ad0 80239bb0 800f0013 ffffffff r4:82ac21e4 r4:e05addc0 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:555:5118 blocked for more than 465 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:555 state:D stack:0 pid:5118 tgid:5118 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb6e9d84 r8:00000002 r7:60000013 r6:eb6e9d8c r5:855b1800 r4:855b1800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855b1800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6e9e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85597180 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:855b1800 r7:00000000 r6:83018000 r5:00001000 r4:7f037000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854f1f8c r4:854f1c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854f1f8c r4:85584800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855b1800 r8:8558482c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85584800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85584800 r8:80287e08 r7:eb6e5e60 r6:85584880 r5:855b1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6e9fb0 to 0xeb6e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8557be80 INFO: task kworker/0:555:5118 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: c8960000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xe05adfb0 to 0xe05adff8) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Workqueue: events bpf_prog_free_deferred r4:855b2400 r5:855b2400 r4:8291a680 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6ede08 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:854f2b8c r4:854f2800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854f2b8c r4:85584900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855b2400 r8:8558492c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85584900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85584900 r8:80287e08 r7:eb6e9e60 r6:85584980 r5:855b2400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6edfb0 to 0xeb6edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85597000 INFO: task kworker/0:556:5120 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: c8d9e000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:557:5122 blocked for more than 465 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:557 state:D stack:0 pid:5122 tgid:5122 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb6f1d84 r8:00000002 r7:60000113 r6:eb6f1d8c r5:855b3000 r4:855b3000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855b3000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6f1e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85597200 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:855b3000 r7:00000000 r6:83018000 r5:00001000 r4:7f039000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafa1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854f238c r4:854f2000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854f238c r4:85584a00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855b3000 r8:85584a2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85584a00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85584a00 r8:80287e08 r7:eb6ede60 r6:85584a80 r5:855b3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6f1fb0 to 0xeb6f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r4:82ac21e4 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8291a684 r9:eb6f5d84 r8:00000002 r7:60000013 r6:eb6f5d8c r5:855b3c00 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854f278c r4:854f2400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854f278c r4:85584b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855b3c00 r8:85584b2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85584b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85584b00 r8:80287e08 r7:eb6ede60 r6:85584b80 r5:855b3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6f5fb0 to 0xeb6f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85597240 INFO: task kworker/0:558:5124 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: c9579000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:854f338c r4:854f3000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854f338c r4:85584c00 r10:61c88647 r9:855b4800 r8:85584c2c r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xeb6f9fb0 to 0xeb6f9ff8) Workqueue: events bpf_prog_free_deferred dd20: c9579000 dfb0b000 00000001 80239b98 7f2f9000 00000001 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85597780 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:855aec00 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb179000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854f2f8c r4:854f2c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854f2f8c r4:85584d00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855aec00 r8:85584d2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85584d00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85584d00 r8:80287e08 r7:eb6f9e60 r6:8557d800 r5:855aec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb701fb0 to 0xeb701ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:855976c0 INFO: task kworker/0:560:5127 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: c996d000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:561:5130 blocked for more than 465 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:561 state:D stack:0 pid:5130 tgid:5130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb70dd84 r8:00000002 r7:60000113 r6:eb70dd8c r5:855ad400 r4:855ad400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855ad400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb70de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85597bc0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:855ad400 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2a5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854f3b8c r4:854f3800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854f3b8c r4:85584d80 r4:85584d80 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:82ac21e4 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:562:5131 blocked for more than 465 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:562 state:D stack:0 pid:5131 tgid:5131 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb711d84 r8:00000002 r7:60000113 r6:eb711d8c r5:855a9800 r4:855a9800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855a9800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 r4:00000000 r5:854f378c r4:854f3400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:855a9800 r8:85584e2c r7:82804d40 r6:dddced80 r5:dddceda0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) task:kworker/0:563 state:D stack:0 pid:5133 tgid:5133 ppid:2 task_flags:0x4208060 flags:0x00000000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:854f3f8c r4:854f3c00 r4:85584e80 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:82ac21e4 r4:00000000 r5:84be078c r4:84be0400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:564 state:D stack:0 pid:5135 tgid:5135 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb721d84 r8:00000002 r7:60000013 r6:eb721d8c r5:85543000 r4:85543000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85543000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb721e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85597f40 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85543000 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb3cf000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855e878c r4:855e8400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855e878c r4:85584f00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85543000 r8:85584f2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85584f00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85584f00 r8:80287e08 r7:eb719e60 r6:8557da00 r5:85543000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb721fb0 to 0xeb721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred Exception stack(0xe05add28 to 0xe05add70) r4:82ac21e4 r4:00000000 r5:84be078c r4:84be0400 r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:85548c00 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:85548c00 r8:85584fac r7:82804d40 r6:dddced80 r5:dddceda0 r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:566:5139 blocked for more than 465 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:566 state:D stack:0 pid:5139 tgid:5139 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb731d84 r8:00000002 r7:60000013 r6:eb731d8c r5:85548000 r4:85548000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85548000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb731e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85590480 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85548000 r7:00000000 r6:83018000 r5:00001000 r4:7f04f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb58b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85517f8c r4:85517c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85517f8c r4:8561c000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85548000 r8:8561c02c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8561c000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8561c000 r8:80287e08 r7:eb721e60 r6:8557db00 r5:85548000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb731fb0 to 0xeb731ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85597e40 INFO: task kworker/0:566:5139 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: c9e7c000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:567:5142 blocked for more than 465 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:567 state:D stack:0 pid:5142 tgid:5142 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb6fdd84 r8:00000002 r7:60000113 r6:eb6fdd8c r5:8554a400 r4:8554a400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6fde08 r4:00000000 r5:855e8b8c r4:855e8800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:8554a400 r8:8561c0ac r7:82804d40 r6:dddced80 r5:dddceda0 task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r5:84be078c r4:84be0400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Workqueue: events bpf_prog_free_deferred r10:8291a684 r9:eb735d84 r8:00000002 r7:60000113 r6:eb735d8c r5:8554bc00 r4:8554bc00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8554bc00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb735e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85624400 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8554bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb74f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8552c38c r4:8552c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8552c38c r4:8557dc00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8554bc00 r8:8557dc2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8557dc00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8557dc00 r8:80287e08 r7:eb625e60 r6:8557dc80 r5:8554bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb735fb0 to 0xeb735ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:855903c0 INFO: task kworker/1:440:5146 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: ca480000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:568 state:D stack:0 pid:5147 tgid:5147 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r5:855e8f8c r4:855e8c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:8561c100 r8:80287e08 r7:eb6fde60 r6:8557dd00 r5:8554c800 task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:00000000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/0:569:5148 blocked for more than 465 seconds. Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb73dd84 r8:00000002 r7:60000013 r6:eb73dd8c r5:8554d400 r4:8554d400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8554d400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb73de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8561d440 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8554d400 r7:00000000 r6:83018000 r5:00001000 r4:7f057000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb743000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855e938c r4:855e9000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855e938c r4:8561c180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8554d400 r8:8561c1ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8561c180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8561c180 r8:80287e08 r7:eb739e60 r6:8557dd80 r5:8554d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb73dfb0 to 0xeb73dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8561d200 INFO: task kworker/0:569:5148 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: ca6cc000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xe05adfb0 to 0xe05adff8) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:8554b000 r4:8291a680 r4:00000000 r5:855e9f8c r4:855e9c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:8554b000 r8:8561c22c r7:82804d40 r6:dddced80 r5:dddceda0 dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8561d1c0 INFO: task kworker/0:570:5151 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: ca9a9000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:441:5153 blocked for more than 465 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:441 state:D stack:0 pid:5153 tgid:5153 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb6ddd84 r8:00000002 r7:60000113 r6:eb6ddd8c r5:8554ec00 r4:8554ec00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8554ec00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:8552cb8c r4:8552c800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:8554ec00 r8:8557deac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85624340 [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r4:82ac21e4 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:442:5155 blocked for more than 465 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:442 state:D stack:0 pid:5155 tgid:5155 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb741d84 r8:00000002 r7:60000013 r6:eb741d8c r5:8554e000 r4:8554e000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8554e000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb741e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85624680 r5:00001000 r4:eb75f000 r5:8552c78c r4:8552c400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:8554e000 r8:8557dfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85624340 [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) dd60: 80230ad0 80239bb0 800f0013 ffffffff r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8552cf8c r4:8552cc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85549800 r8:856230ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: cae6c000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:444:5160 blocked for more than 465 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:444 state:D stack:0 pid:5160 tgid:5160 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb775d84 r8:00000002 r7:60000113 r6:eb775d8c r5:855ae000 r4:855ae000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855ae000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb775e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856249c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:855ae000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a3000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb783000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855e9b8c r4:855e9800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855e9b8c r4:85623180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855ae000 r8:856231ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85623180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85623180 r8:80287e08 r7:eb72de60 r6:85623200 r5:855ae000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb775fb0 to 0xeb775ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:856247c0 INFO: task kworker/1:444:5160 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 INFO: task kworker/1:445:5162 blocked for more than 465 seconds. Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb781d84 r8:00000002 r7:60000113 r6:eb781d8c r5:855b8000 r4:855b8000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855b8000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb781e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8479c880 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:855b8000 r7:00000000 r6:83018200 r5:00001000 r4:7f0e5000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec5c9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8552ff8c r4:8552fc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8552ff8c r4:85623280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855b8000 r8:856232ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85623280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85623280 r8:80287e08 r7:eb775e60 r6:85623300 r5:855b8000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb781fb0 to 0xeb781ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85624900 INFO: task kworker/1:445:5162 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: cb3fa000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:84be078c r4:84be0400 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:446:5163 blocked for more than 465 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:446 state:D stack:0 pid:5163 tgid:5163 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb769d84 r8:00000002 r7:60000113 r6:eb769d8c r5:855b8c00 r4:855b8c00 [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:8552d78c r4:8552d400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:855b8c00 r8:856233ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:85623380 r8:80287e08 r7:eb781e60 r6:85623400 r5:855b8c00 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 dd20: cb3fa000 dfb0b000 00000001 80239b98 7f2f9000 00000001 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r4:84ba87c0 task:kworker/0:571 state:D stack:0 pid:5165 tgid:5165 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:855ba400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855ba400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb51de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8561dc00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:855ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f063000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfaa7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855ea38c r4:855ea000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855ea38c r4:8561c280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855ba400 r8:8561c2ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8561c280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8561c280 r8:80287e08 r7:eb74de60 r6:85623480 r5:855ba400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb51dfb0 to 0xeb51dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8561d980 INFO: task kworker/0:571:5165 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: cb541000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced80 r6:83018000 r5:855ea78c r4:8561c300 r4:00000001 r4:8561dc80 Workqueue: events bpf_prog_free_deferred dd60: 80230ad0 80239bb0 800f0013 ffffffff r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:573:5169 blocked for more than 465 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:573 state:D stack:0 pid:5169 tgid:5169 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb671d84 r8:00000002 r7:60000013 r6:eb671d8c r5:855bc800 r4:855bc800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855bc800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb671e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85590540 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:855bc800 r7:00000000 r6:83018000 r5:00001000 r4:7f06d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead11000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855eb78c r4:855eb400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855eb78c r4:8561c380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855bc800 r8:8561c3ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8561c380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8561c380 r8:80287e08 r7:eb559e60 r6:85623580 r5:855bc800 r4:8561da80 r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 Exception stack(0xe05add28 to 0xe05add70) dd20: cb88d000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 Not tainted 6.15.0-rc7-syzkaller #0 r4:855bd400 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb67de08 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:855eab8c r4:855ea800 r7:dddced80 r6:83018000 r5:855eab8c r4:8561c400 r4:8561c400 Exception stack(0xeb67dfb0 to 0xeb67dff8) Workqueue: events bpf_prog_free_deferred dd20: cbb3b000 dfb0b000 00000001 80239b98 7f2f9000 00000001 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:575:5172 blocked for more than 465 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:575 state:D stack:0 pid:5172 tgid:5172 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb699d84 r8:00000002 r7:60000013 r6:eb699d8c r5:855bbc00 r4:855bbc00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855bbc00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb699e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8561d7c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:855bbc00 r7:00000000 r6:83018000 r5:00001000 r4:7f069000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0763000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855eaf8c r4:855eac00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855eaf8c r4:8561c480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855bbc00 r8:8561c4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8561c480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8561c480 r8:80287e08 r7:eb671e60 r6:85623680 r5:855bbc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb699fb0 to 0xeb699ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8561df80 INFO: task kworker/0:575:5172 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r4:00000000 dd60: 80230ad0 80239bb0 800f0013 ffffffff r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 task:kworker/0:576 state:D stack:0 pid:5174 tgid:5174 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:855b6000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855b6000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb78de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8561d540 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:855b6000 r7:00000000 r6:83018000 r5:00001000 r4:7f06b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa4f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855eb38c r4:855eb000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855eb38c r4:8561c500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855b6000 r8:8561c52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8561c500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8561c500 r8:80287e08 r7:eb671e60 r6:8561c580 r5:855b6000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb78dfb0 to 0xeb78dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8561de40 INFO: task kworker/0:576:5174 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: cc33a000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6ade08 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:855ebb8c r4:855eb800 r10:61c88647 r9:855b6c00 r8:8561c62c r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:578:5178 blocked for more than 466 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:578 state:D stack:0 pid:5178 tgid:5178 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb6c5d84 r8:00000002 r7:60000013 r6:eb6c5d8c r5:855b5400 r4:855b5400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855b5400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6c5e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856280c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:855b5400 r7:00000000 r6:83018000 r5:00001000 r4:7f071000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855ebf8c r4:855ebc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855ebf8c r4:8561c700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855b5400 r8:8561c72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8561c700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8561c700 r8:80287e08 r7:eb6ade60 r6:8561c780 r5:855b5400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6c5fb0 to 0xeb6c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8561d380 INFO: task kworker/0:578:5178 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: cc33a000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 INFO: task kworker/0:579:5181 blocked for more than 466 seconds. Workqueue: events bpf_prog_free_deferred r4:855c0000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855c0000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6d5e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85628340 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:855c0000 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb035000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855ec38c r4:855ec000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855ec38c r4:8561c800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855c0000 r8:8561c82c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8561c800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8561c800 r8:80287e08 r7:eb6c5e60 r6:8561c880 r5:855c0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6d5fb0 to 0xeb6d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85628000 INFO: task kworker/0:579:5181 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: ccbb4000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:855ec78c r4:855ec400 r10:61c88647 r9:855c0c00 r8:8561c92c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85628380 [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r4:82ac21e4 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:581:5185 blocked for more than 466 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:581 state:D stack:0 pid:5185 tgid:5185 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb795d84 r8:00000002 r7:60000113 r6:eb795d8c r5:855c1800 r4:855c1800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855c1800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb795e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85628680 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:855c1800 r7:00000000 r6:83018000 r5:00001000 r4:7f07b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb379000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855ecb8c r4:855ec800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855ecb8c r4:8561ca00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855c1800 r8:8561ca2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8561ca00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8561ca00 r8:80287e08 r7:eb791e60 r6:8561ca80 r5:855c1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb795fb0 to 0xeb795ff8) 5fa0: 00000000 00000000 00000000 00000000 r4:85628300 r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 r4:00000001 r4:84ba87c0 task:kworker/0:582 state:D stack:0 pid:5189 tgid:5189 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r4:00000000 r5:00001000 r4:eb3b5000 r5:855ecf8c r4:855ecc00 r10:61c88647 r9:855c3c00 r8:8561cb2c r7:82804d40 r6:dddced80 r5:dddceda0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:82ac21e4 r4:00000000 r5:84be078c r4:84be0400 r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 INFO: task kworker/1:447:5190 blocked for more than 466 seconds. r5:855c4800 r4:8291a680 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r9:83018205 r8:855c4800 r7:00000000 r6:83018200 r5:00001000 r4:7f0ad000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb853000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855f638c r4:855f6000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855f638c r4:85623700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855c4800 r8:8562372c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85623700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85623700 r8:80287e08 r7:eb781e60 r6:8561cc00 r5:855c4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7a1fb0 to 0xeb7a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8562c3c0 INFO: task kworker/1:447:5190 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: cd35d000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:583:5192 blocked for more than 466 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:583 state:D stack:0 pid:5192 tgid:5192 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb7a5d84 r8:00000002 r7:60000113 r6:eb7a5d8c r5:855c5400 r4:855c5400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855c5400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7a5e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:855ed78c r4:855ed400 r7:dddced80 r6:83018000 r5:855ed78c r4:8561cc80 r4:00000001 r4:856287c0 Workqueue: events bpf_prog_free_deferred dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 r4:00000000 r5:84be078c r4:84be0400 r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 INFO: task kworker/0:584:5193 blocked for more than 466 seconds. r4:855c3000 r4:00000000 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:855ed38c r4:855ed000 r7:dddced80 r6:83018000 r5:855ed38c r4:8561cd80 Exception stack(0xeb7a9fb0 to 0xeb7a9ff8) Workqueue: events bpf_prog_free_deferred Exception stack(0xe05add28 to 0xe05add70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:585:5196 blocked for more than 466 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:585 state:D stack:0 pid:5196 tgid:5196 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb7add84 r8:00000002 r7:60000013 r6:eb7add8c r5:855c6c00 r4:855c6c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855c6c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7ade08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85628f40 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:855c6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb501000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855edb8c r4:855ed800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855edb8c r4:8561ce80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855c6c00 r8:8561ceac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8561ce80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8561ce80 r8:80287e08 r7:eb7a5e60 r6:8561cf00 r5:855c6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7adfb0 to 0xeb7adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85628b40 INFO: task kworker/0:585:5196 is blocked on a mutex likely owned by task kworker/1:202:3656. r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:82ac21e4 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8291a684 r9:eb7b1d84 r8:00000002 r7:60000113 r6:eb7b1d8c r5:855d0000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85629440 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:855d0000 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb585000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855ee78c r4:855ee400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855ee78c r4:8561cf80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855d0000 r8:8561cfac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8561cf80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8561cf80 r8:80287e08 r7:eb7ade60 r6:8562a000 r5:855d0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7b1fb0 to 0xeb7b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85628dc0 INFO: task kworker/0:586:5198 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: cdca0000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:587:5200 blocked for more than 466 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:587 state:D stack:0 pid:5200 tgid:5200 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb7b5d84 r8:00000002 r7:60000013 r6:eb7b5d8c r5:855d1800 r4:855d1800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855d1800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7b5e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8561d380 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:855d1800 r7:00000000 r6:83018000 r5:00001000 r4:7f085000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb531000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855edf8c r4:855edc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855edf8c r4:8562a080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855d1800 r8:8562a0ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8562a080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8562a080 r8:80287e08 r7:eb7b1e60 r6:8562a100 r5:855d1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7b5fb0 to 0xeb7b5ff8) 5fa0: 00000000 00000000 00000000 00000000 task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Call trace: [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85629080 INFO: task kworker/0:588:5202 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: ce477000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:84bbbf00 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb673000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855eeb8c r4:855ee800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:8562a280 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: dd20: ce9b8000 dfb0b000 00000001 80239b98 7f2f9000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:855bb000 r8:8562a32c r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:591:5208 blocked for more than 466 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:591 state:D stack:0 pid:5208 tgid:5208 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb7c1d84 r8:00000002 r7:60000013 r6:eb7c1d8c r5:855bec00 r4:855bec00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855bec00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7c1e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85629ac0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:855bec00 r7:00000000 r6:83018000 r5:00001000 r4:7f093000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7d7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855efb8c r4:855ef800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855efb8c r4:8562a380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855bec00 r8:8562a3ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8562a380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8562a380 r8:80287e08 r7:eb7bde60 r6:85623880 r5:855bec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7c1fb0 to 0xeb7c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85629400 INFO: task kworker/0:591:5208 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: cee77000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r5:00001000 r4:dfd07000 r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfa0: 00000000 00000000 00000000 00000000 Not tainted 6.15.0-rc7-syzkaller #0 r4:84b58c00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7c9e08 r5:00001000 r4:eb6a9000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:85629680 Call trace: Exception stack(0xe05add28 to 0xe05add70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:593:5211 blocked for more than 466 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:593 state:D stack:0 pid:5211 tgid:5211 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb4c5d84 r8:00000002 r7:60000013 r6:eb4c5d8c r5:855d2400 r4:855d2400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855d2400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4c5e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85629940 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:855d2400 r7:00000000 r6:83018000 r5:00001000 r4:7f091000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855ef78c r4:855ef400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855ef78c r4:8562a480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855d2400 r8:8562a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8562a480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8562a480 r8:80287e08 r7:eb7c1e60 r6:8562a500 r5:855d2400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4c5fb0 to 0xeb4c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85629680 INFO: task kworker/0:593:5211 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: cf505000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 r4:00000001 r4:84ba87c0 task:kworker/0:594 state:D stack:0 pid:5215 tgid:5215 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:855d3c00 r8:8562a5ac r7:82804d40 r6:dddced80 r5:dddceda0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:595:5216 blocked for more than 466 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:595 state:D stack:0 pid:5216 tgid:5216 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb7e1d84 r8:00000002 r7:60000113 r6:eb7e1d8c r5:855d4800 r4:855d4800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855d4800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7e1e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85629d40 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:855d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f097000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7ef000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855f438c r4:855f4000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855f438c r4:8562a680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:8562a680 r8:80287e08 r7:eb7d5e60 r6:8562a700 r5:855d4800 task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:8562a780 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r5:00001000 r4:dfd07000 r4:84bbbf00 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/0:597:5220 blocked for more than 466 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:597 state:D stack:0 pid:5220 tgid:5220 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb7c5d84 r8:00000002 r7:60000113 r6:eb7c5d8c r5:855d6000 r4:855d6000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855d6000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7c5e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85629ec0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:855d6000 r7:00000000 r6:83018000 r5:00001000 r4:7f099000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7fb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855f478c r4:855f4400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855f478c r4:8562a880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855d6000 r8:8562a8ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8562a880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8562a880 r8:80287e08 r7:eb7ede60 r6:8562a900 r5:855d6000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7c5fb0 to 0xeb7c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85629b40 INFO: task kworker/0:597:5220 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: d0272000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:84be078c r4:84be0400 r4:84bbbf00 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:8562a980 r8:80287e08 r7:eb7ede60 r6:8562aa00 r5:855d6c00 r4:8563b000 Call trace: dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855f538c r4:855f5000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855f538c r4:8562aa80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855d0c00 r8:8562aaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8562aa80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8562aa80 r8:80287e08 r7:eb7f9e60 r6:8562ab00 r5:855d0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb811fb0 to 0xeb811ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8563b240 INFO: task kworker/0:599:5224 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: d093c000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:600:5226 blocked for more than 466 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:600 state:D stack:0 pid:5226 tgid:5226 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb805d84 r8:00000002 r7:60000113 r6:eb805d8c r5:855c2400 r4:855c2400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855c2400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb805e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8563b4c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:eb82b000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:8562ab80 r8:80287e08 r7:eb811e60 r6:8562ac00 r5:855c2400 task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb833000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:8562ac80 r8:80287e08 r7:eb805e60 r6:8562ad00 r5:84888000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8563b340 INFO: task kworker/0:601:5228 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: d093c000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:602:5230 blocked for more than 466 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:602 state:D stack:0 pid:5230 tgid:5230 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb849d84 r8:00000002 r7:60000013 r6:eb849d8c r5:84b5a400 r4:84b5a400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b5a400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb849e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8563b800 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84b5a400 r7:00000000 r6:83018000 r5:00001000 r4:7f0ab000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb83f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855f5f8c r4:855f5c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855f5f8c r4:8562ad80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b5a400 r8:8562adac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8562ad80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8562ad80 r8:80287e08 r7:eb829e60 r6:85623980 r5:84b5a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xe05add28 to 0xe05add70) r4:82ac21e4 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:84ba87c0 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:8562ae00 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:82ac21e4 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:604:5235 blocked for more than 466 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:604 state:D stack:0 pid:5235 tgid:5235 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb869d84 r8:00000002 r7:60000013 r6:eb869d8c r5:84b5d400 r4:84b5d400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b5d400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb869e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8563bfc0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84b5d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0b7000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb897000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855f778c r4:855f7400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855f778c r4:8562ae80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b5d400 r8:8562aeac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8562ae80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8562ae80 r8:80287e08 r7:eb851e60 r6:85623a80 r5:84b5d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb869fb0 to 0xeb869ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8563b880 INFO: task kworker/0:604:5235 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: d156b000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84bbbf00 r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 INFO: task kworker/0:605:5236 blocked for more than 466 seconds. r4:84b5e000 [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:855f6b8c r4:8562af00 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xe05add28 to 0xe05add70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:606:5238 blocked for more than 466 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:606 state:D stack:0 pid:5238 tgid:5238 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb87dd84 r8:00000002 r7:60000013 r6:eb87dd8c r5:84b5ec00 r4:84b5ec00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b5ec00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb87de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8563bd80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84b5ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0b3000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb87f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855f6f8c r4:855f6c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855f6f8c r4:8562af80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b5ec00 r8:8562afac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8562af80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8562af80 r8:80287e08 r7:eb869e60 r6:85623b80 r5:84b5ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb87dfb0 to 0xeb87dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8563ba00 INFO: task kworker/0:606:5238 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r5:800f0013 r4:80239bb0 r5:00001000 r4:dfd07000 r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 Workqueue: events bpf_prog_free_deferred [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8563be80 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe05add28 to 0xe05add70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:84ba87c0 task:kworker/0:608 state:D stack:0 pid:5243 tgid:5243 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb889e08 r5:00001000 r4:eb8a3000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84889800 r8:8564512c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85645100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85645100 r8:80287e08 r7:eb869e60 r6:85645180 r5:84889800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb889fb0 to 0xeb889ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8563be40 INFO: task kworker/0:608:5243 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: d1dc0000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:609:5244 blocked for more than 466 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:609 state:D stack:0 pid:5244 tgid:5244 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb8a1d84 r8:00000002 r7:60000113 r6:eb8a1d8c r5:8488a400 r4:8488a400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8488a400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 Workqueue: events bpf_prog_free_deferred dd20: d230c000 dfb0b000 00000001 80239b98 7f2f9000 00000001 r4:e05addc0 r5:00001000 r4:dfd07000 r4:84bbbf00 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Call trace: [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:82ac21e4 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:610:5248 blocked for more than 466 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:610 state:D stack:0 pid:5248 tgid:5248 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb83dd84 r8:00000002 r7:60000113 r6:eb83dd8c r5:8488bc00 r4:8488bc00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8488bc00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb83de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856530c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8488bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f0bd000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8bb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8560038c r4:85600000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8560038c r4:85645380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8488bc00 r8:856453ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85645380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85645380 r8:80287e08 r7:eb8a1e60 r6:85645400 r5:8488bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb83dfb0 to 0xeb83dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85653000 INFO: task kworker/0:610:5248 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: d230c000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r4:84bbbf00 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-rc7-syzkaller #0 r4:8488c800 [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r5:84be078c r4:84be0400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:612:5252 blocked for more than 466 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:612 state:D stack:0 pid:5252 tgid:5252 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb8c5d84 r8:00000002 r7:60000113 r6:eb8c5d8c r5:8488d400 r4:8488d400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8488d400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8c5e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856534c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8488d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0c1000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8d3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85600b8c r4:85600800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85600b8c r4:85645580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8488d400 r8:856455ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85645580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85645580 r8:80287e08 r7:eb8b9e60 r6:85645600 r5:8488d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8c5fb0 to 0xeb8c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85653240 INFO: task kworker/0:612:5252 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: d299e000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r5:84be078c r4:84be0400 r4:84bbbf00 dfa0: 00000000 00000000 00000000 00000000 task:kworker/0:613 state:D stack:0 pid:5254 tgid:5254 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb8d1d84 r8:00000002 r7:60000113 r6:eb8d1d8c r5:8488e000 r4:8488e000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8488e000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8d1e08 r4:00000000 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dd20: d2d6a000 dfb0b000 00000001 80239b98 7f2f9000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-rc7-syzkaller #0 r10:8291a684 r9:eb8e9d84 r8:00000002 r7:60000113 r6:eb8e9d8c r5:84b5b000 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: dd20: d3135000 dfb0b000 00000001 80239b98 7f2f9000 00000001 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:615:5258 blocked for more than 466 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:615 state:D stack:0 pid:5258 tgid:5258 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb705d84 r8:00000002 r7:60000113 r6:eb705d8c r5:84b58000 r4:84b58000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b58000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb705e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85653900 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84b58000 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e001d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8560178c r4:85601400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8560178c r4:85645780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b58000 r8:856457ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85645780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85645780 r8:80287e08 r7:eb8d1e60 r6:85623d00 r5:84b58000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb705fb0 to 0xeb705ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:856535c0 INFO: task kworker/0:615:5258 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: d3135000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/0:616:5260 blocked for more than 466 seconds. [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85653a80 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:84b5bc00 r8:856458ac r7:82804d40 r6:dddced80 r5:dddceda0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85653780 INFO: task kworker/0:616:5260 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: d37d0000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:617:5262 blocked for more than 466 seconds. Not tainted 6.15.0-rc7-syzkaller #0 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:85550000 r8:8564592c r7:82804d40 r6:dddced80 r5:dddceda0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xe05add28 to 0xe05add70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r5:00001000 r4:dfd07000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:618:5264 blocked for more than 466 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:618 state:D stack:0 pid:5264 tgid:5264 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb77dd84 r8:00000002 r7:60000113 r6:eb77dd8c r5:85551800 r4:85551800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85551800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb77de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85653e40 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85551800 r7:00000000 r6:83018000 r5:00001000 r4:7f031000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae8d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8560278c r4:85602400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: dd20: d4127000 dfb0b000 00000001 80239b98 7f2f9000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:619:5265 blocked for more than 466 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:619 state:D stack:0 pid:5265 tgid:5265 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb789d84 r8:00000002 r7:60000113 r6:eb789d8c r5:85552400 r4:85552400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85552400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb789e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85653d40 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xeb789fb0 to 0xeb789ff8) r4:85653a00 r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r5:00001000 r4:dfd07000 r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfa0: 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:85645a80 Exception stack(0xeb8f5fb0 to 0xeb8f5ff8) task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:621:5270 blocked for more than 466 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:621 state:D stack:0 pid:5270 tgid:5270 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb8ddd84 r8:00000002 r7:60000013 r6:eb8ddd8c r5:85553c00 r4:85553c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85553c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8dde08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85653cc0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85553c00 r7:00000000 r6:83018000 r5:00001000 r4:7f035000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafb1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85602b8c r4:85602800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85602b8c r4:85645b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85553c00 r8:85645b2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85645b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85645b00 r8:80287e08 r7:eb8f5e60 r6:856a7000 r5:85553c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8ddfb0 to 0xeb8ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85653c40 INFO: task kworker/0:621:5270 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: d42e8000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Call trace: [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:85554800 r8:85645bac r7:82804d40 r6:dddced80 r5:dddceda0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:82ac21e4 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r4:84bbbf00 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-rc7-syzkaller #0 r4:85555400 [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8fde08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8569f340 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85555400 r7:00000000 r6:83018000 r5:00001000 r4:7f039000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb16d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8560338c r4:85603000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8560338c r4:85645c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85555400 r8:85645c2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85645c00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85645c00 r8:80287e08 r7:eb8f9e60 r6:856a7100 r5:85555400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8fdfb0 to 0xeb8fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8569f280 INFO: task kworker/0:623:5274 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: d4b9e000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 INFO: task kworker/0:624:5277 blocked for more than 467 seconds. r4:85553000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb909e08 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:85603b8c r4:85645c80 r10:00000000 r9:85645c80 r8:80287e08 r7:eb8f9e60 r6:856a7180 r5:85553000 task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:800f0013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:625:5278 blocked for more than 467 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:625 state:D stack:0 pid:5278 tgid:5278 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb911d84 r8:00000002 r7:60000113 r6:eb911d8c r5:84b59800 r4:84b59800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b59800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb911e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8569f700 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84b59800 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2c5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85603f8c r4:85603c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85603f8c r4:85645d00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b59800 r8:85645d2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85645d00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85645d00 r8:80287e08 r7:eb909e60 r6:856a7200 r5:84b59800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb911fb0 to 0xeb911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8569f300 INFO: task kworker/0:625:5278 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: d4b9e000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:626:5280 blocked for more than 467 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:626 state:D stack:0 pid:5280 tgid:5280 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb915d84 r8:00000002 r7:60000113 r6:eb915d8c r5:85556c00 r4:85556c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85556c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb915e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8569f840 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85556c00 r7:00000000 r6:83018000 r5:00001000 r4:7f041000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb303000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8560438c r4:85604000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8560438c r4:85645d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85556c00 r8:85645dac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85645d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85645d80 r8:80287e08 r7:eb911e60 r6:856a7280 r5:85556c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb915fb0 to 0xeb915ff8) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe05add28 to 0xe05add70) r4:82ac21e4 r4:00000000 r5:00001000 r4:dfd07000 r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb605000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:85558c00 r8:85645e2c r7:82804d40 r6:dddced80 r5:dddceda0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: dd20: d51e2000 dfb0b000 00000001 80239b98 7f2f9000 00000001 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb463000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:85558000 r8:85645eac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85645e80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85645e80 r8:80287e08 r7:eb921e60 r6:856a7380 r5:85558000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb92dfb0 to 0xeb92dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8569f800 INFO: task kworker/0:628:5286 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: d51e2000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:629:5287 blocked for more than 467 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:629 state:D stack:0 pid:5287 tgid:5287 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb931d84 r8:00000002 r7:60000113 r6:eb931d8c r5:8555b000 r4:8555b000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8555b000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb931e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85604b8c r4:85604800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85604b8c r4:85645f00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8555b000 r8:85645f2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85645f00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85645f00 r8:80287e08 r7:eb921e60 r6:856a7400 r5:8555b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb931fb0 to 0xeb931ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8569f800 INFO: task kworker/0:629:5287 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: d565d000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:84ba87c0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb93dd84 r8:00000002 r7:60000013 r6:eb93dd8c r5:85559800 r4:85559800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85559800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb93de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856ba0c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85559800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb95b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8560678c r4:85606400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8560678c r4:856b5000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85559800 r8:856b502c r7:82804d40 r6:dddced80 r5:dddceda0 r4:856b5000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856b5000 r8:80287e08 r7:eb921e60 r6:856a7500 r5:85559800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb93dfb0 to 0xeb93dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8569fb80 INFO: task kworker/0:631:5291 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: d6041000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:84bbbf00 Exception stack(0xe05adfb0 to 0xe05adff8) r4:84ba87c0 Workqueue: events bpf_prog_free_deferred r4:8555c800 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8569fec0 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8560578c r4:85605400 r10:61c88647 r9:8555c800 r8:856b50ac r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xeb941fb0 to 0xeb941ff8) r4:8569fb80 task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 r4:e05addc0 r5:00001000 r4:dfd07000 r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8291a684 r9:eb949d84 r8:00000002 r7:60000013 r6:eb949d8c r5:8555d400 r4:8555d400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8555d400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb949e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8569f080 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8555d400 r7:00000000 r6:83018000 r5:00001000 r4:7f04f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb725000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85605b8c r4:85605800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85605b8c r4:856b5100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8555d400 r8:856b512c r7:82804d40 r6:dddced80 r5:dddceda0 r4:856b5100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856b5100 r8:80287e08 r7:eb93de60 r6:856a7680 r5:8555d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb949fb0 to 0xeb949ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8569fe80 INFO: task kworker/0:633:5295 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: d6173000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-rc7-syzkaller #0 r10:8291a684 r9:eb94dd84 r8:00000002 r7:60000113 r6:eb94dd8c r5:8555ec00 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8552e78c r4:8552e400 r7:ddde2d80 r6:83018200 r5:8552e78c r4:856a7600 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: d6173000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:dfd07000 r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfa0: 00000000 00000000 00000000 00000000 task:kworker/0:634 state:D stack:0 pid:5299 tgid:5299 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb951e08 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:85605f8c r4:856b5180 r10:00000000 r9:856b5180 r8:80287e08 r7:eb93de60 r6:856a7780 r5:8555e000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xe05add28 to 0xe05add70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-rc7-syzkaller #0 r4:855c6000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb969e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84620d40 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:855c6000 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb779000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8560638c r4:85606000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8560638c r4:856b5200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855c6000 r8:856b522c r7:82804d40 r6:dddced80 r5:dddceda0 r4:856b5200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856b5200 r8:80287e08 r7:eb93de60 r6:856a7800 r5:855c6000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb969fb0 to 0xeb969ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:856ba000 INFO: task kworker/0:635:5302 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: d69ef000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:84ba87c0 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb993000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:85560000 r8:856b52ac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xe05add28 to 0xe05add70) r4:82ac21e4 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:637:5304 blocked for more than 467 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:637 state:D stack:0 pid:5304 tgid:5304 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb929d84 r8:00000002 r7:60000013 r6:eb929d8c r5:855d9800 r4:855d9800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855d9800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb929e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856ba300 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:856ba240 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 r5:84be078c r4:84be0400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb979e08 r5:00001000 r4:eb97b000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:855db000 r8:856b542c r7:82804d40 r6:dddced80 r5:dddceda0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:82ac21e4 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:639:5310 blocked for more than 467 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:639 state:D stack:0 pid:5310 tgid:5310 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb985d84 r8:00000002 r7:60000113 r6:eb985d8c r5:855dbc00 r4:855dbc00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855dbc00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb985e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856ba600 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:855dbc00 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb987000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8560738c r4:85607000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8560738c r4:856b5500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855dbc00 r8:856b552c r7:82804d40 r6:dddced80 r5:dddceda0 r4:856b5500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856b5500 r8:80287e08 r7:eb96de60 r6:856b5580 r5:855dbc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb985fb0 to 0xeb985ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:856ba480 INFO: task kworker/0:639:5310 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: d722e000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/0:640:5311 blocked for more than 467 seconds. r4:855dc800 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8ede08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856ba900 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:855dc800 r7:00000000 r6:83018000 r5:00001000 r4:7f05f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb99f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85607b8c r4:85607800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85607b8c r4:856b5600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855dc800 r8:856b562c r7:82804d40 r6:dddced80 r5:dddceda0 r4:856b5600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856b5600 r8:80287e08 r7:eb96de60 r6:856b5680 r5:855dc800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8edfb0 to 0xeb8edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:856ba5c0 INFO: task kworker/0:640:5311 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: d7648000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:855dd400 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:82ac21e4 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:643:5317 blocked for more than 467 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:643 state:D stack:0 pid:5317 tgid:5317 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb9b5d84 r8:00000002 r7:60000113 r6:eb9b5d8c r5:855dec00 r4:855dec00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855dec00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9b5e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856badc0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:855dec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a1000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb9c3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8560c78c r4:8560c400 r7:dddced80 r6:83018000 r5:8560c78c r4:856b5900 r4:00000001 task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:00001000 r4:dfd07000 r4:00000001 r4:84ba87c0 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:856b5a00 r8:80287e08 r7:eb9b5e60 r6:856b5a80 r5:855da400 r4:856bacc0 r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r5:84be078c r4:84be0400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:84ba87c0 Workqueue: events bpf_prog_free_deferred r5:855d8c00 r4:8291a680 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856bafc0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:855d8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0c5000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb9db000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8560cf8c r4:8560cc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8560cf8c r4:856b5b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855d8c00 r8:856b5b2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:856b5b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856b5b00 r8:80287e08 r7:eb9c1e60 r6:856b5b80 r5:855d8c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9d9fb0 to 0xeb9d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:856bacc0 INFO: task kworker/0:645:5322 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: d8043000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:646:5323 blocked for more than 467 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:646 state:D stack:0 pid:5323 tgid:5323 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb99dd84 r8:00000002 r7:60000013 r6:eb99dd8c r5:855d8000 r4:855d8000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855d8000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb99de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xeb99dfb0 to 0xeb99dff8) task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:647:5325 blocked for more than 467 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:647 state:D stack:0 pid:5325 tgid:5325 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb9f1d84 r8:00000002 r7:60000113 r6:eb9f1d8c r5:856e0000 r4:856e0000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:856e0000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9f1e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856d2580 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8560db8c r4:8560d800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8560db8c r4:856b5d00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856e0000 r8:856b5d2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:856b5d00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856b5d00 r8:80287e08 r7:eb99de60 r6:856b5d80 r5:856e0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9f1fb0 to 0xeb9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:856d2180 INFO: task kworker/0:647:5325 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: d856d000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-rc7-syzkaller #0 r5:856e0c00 r4:8291a680 r4:00000000 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856d2280 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:856e0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0c9000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb9f3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8560d78c r4:8560d400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8560d78c r4:856b5e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856e0c00 r8:856b5e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:856b5e00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856b5e00 r8:80287e08 r7:eb9f1e60 r6:856b5e80 r5:856e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9fdfb0 to 0xeb9fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:856d2100 task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r4:84bbbf00 Exception stack(0xe05adfb0 to 0xe05adff8) INFO: task kworker/0:649:5329 blocked for more than 467 seconds. [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:856e2400 r8:856b5f2c r7:82804d40 r6:dddced80 r5:dddceda0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xe05adfb0 to 0xe05adff8) Not tainted 6.15.0-rc7-syzkaller #0 r4:856e3c00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba15e08 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xeba15fb0 to 0xeba15ff8) task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: d8bf6000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:651:5333 blocked for more than 467 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8560e38c r4:8560e000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: dd20: d95ff000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:652:5335 blocked for more than 467 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:652 state:D stack:0 pid:5335 tgid:5335 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb689d84 r8:00000002 r7:60000113 r6:eb689d8c r5:856e1800 r4:856e1800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:856e1800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb689e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856d2f80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:856e1800 r7:00000000 r6:83018000 r5:00001000 r4:7f065000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 Exception stack(0xe05adfb0 to 0xe05adff8) Not tainted 6.15.0-rc7-syzkaller #0 r4:856e5400 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6b9e08 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:8560eb8c r4:856d7300 Exception stack(0xeb6b9fb0 to 0xeb6b9ff8) task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:800f0013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9e5e08 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8560f38c r4:8560f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8560f38c r4:856d7400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856e3000 r8:856d742c r7:82804d40 r6:dddced80 r5:dddceda0 r4:856d7400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856d7400 r8:80287e08 r7:eb689e60 r6:856d7480 r5:856e3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9e5fb0 to 0xeb9e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8564bb40 INFO: task kworker/0:654:5340 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: d9d50000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/0:655:5341 blocked for more than 467 seconds. r5:856e6c00 r4:8291a680 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856d6040 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:8560f78c r4:856d7500 r10:00000000 r9:856d7500 r8:80287e08 r7:eb9e5e60 r6:856d7580 r5:856e6c00 task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:856e6000 r4:8291a680 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:856e6000 r7:00000000 r6:83018000 r5:00001000 r4:7f06b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead37000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8560fb8c r4:8560f800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8560fb8c r4:856d7600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856e6000 r8:856d762c r7:82804d40 r6:dddced80 r5:dddceda0 r4:856d7600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856d7600 r8:80287e08 r7:eb7d1e60 r6:856d7680 r5:856e6000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7ddfb0 to 0xeb7ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:856d6180 INFO: task kworker/0:656:5343 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: d9d50000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:657:5345 blocked for more than 467 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:657 state:D stack:0 pid:5345 tgid:5345 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb7e9d84 r8:00000002 r7:60000113 r6:eb7e9d8c r5:8488ec00 r4:8488ec00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8488ec00 r4:8291a680 [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8560ff8c r4:8560fc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8560ff8c r4:856d7700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8488ec00 r8:856d772c r7:82804d40 r6:dddced80 r5:dddceda0 r4:856d7700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856d7700 r8:80287e08 r7:eb7dde60 r6:856d7780 r5:8488ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7e9fb0 to 0xeb7e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:856d6140 INFO: task kworker/0:657:5345 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: da2d5000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 r4:e05addc0 r5:00001000 r4:dfd07000 r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/0:658:5348 blocked for more than 467 seconds. r5:849c0000 r4:8291a680 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:8561838c r4:856d7800 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xe05add28 to 0xe05add70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:659:5349 blocked for more than 467 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:659 state:D stack:0 pid:5349 tgid:5349 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb801d84 r8:00000002 r7:60000113 r6:eb801d8c r5:849c0c00 r4:849c0c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:849c0c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb801e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856d6900 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:849c0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f071000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0c1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8561878c r4:85618400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8561878c r4:856d7900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:849c0c00 r8:856d792c r7:82804d40 r6:dddced80 r5:dddceda0 r4:856d7900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856d7900 r8:80287e08 r7:eb7f5e60 r6:856d7980 r5:849c0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb801fb0 to 0xeb801ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb819e08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:661:5354 blocked for more than 467 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:661 state:D stack:0 pid:5354 tgid:5354 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb80dd84 r8:00000002 r7:60000113 r6:eb80dd8c r5:849c2400 r4:849c2400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:849c2400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb80de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb3c5000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:856d7c00 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r4:85563000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85563000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb859e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856d6d80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85563000 r7:00000000 r6:83018000 r5:00001000 r4:7f07f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb565000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85619b8c r4:85619800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85619b8c r4:856d7c80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85563000 r8:856d7cac r7:82804d40 r6:dddced80 r5:dddceda0 r4:856d7c80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856d7c80 r8:80287e08 r7:eb84de60 r6:856a7980 r5:85563000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb859fb0 to 0xeb859ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:856d6c40 INFO: task kworker/0:663:5357 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: db0a1000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 Exception stack(0xe05adfb0 to 0xe05adff8) r4:84ba87c0 Workqueue: events bpf_prog_free_deferred [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:856a7a00 Exception stack(0xeb839fb0 to 0xeb839ff8) task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: db0a1000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:84bbbf00 Exception stack(0xe05adfb0 to 0xe05adff8) INFO: task kworker/0:664:5362 blocked for more than 467 seconds. r5:85564800 r4:8291a680 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8561978c r4:85619400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8561978c r4:856d7d00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85564800 r8:856d7d2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:856d7d00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856d7d00 r8:80287e08 r7:eb859e60 r6:856a7b00 r5:85564800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb845fb0 to 0xeb845ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:856d6e00 INFO: task kworker/0:664:5362 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: db211000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 r4:e05addc0 r5:00001000 r4:dfd07000 r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb825e08 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:856d7d80 r8:80287e08 r7:eb859e60 r6:856d7e00 r5:849c3000 r4:856d6d00 r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:666:5365 blocked for more than 467 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:666 state:D stack:0 pid:5365 tgid:5365 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb861d84 r8:00000002 r7:60000113 r6:eb861d8c r5:849c3c00 r4:849c3c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:849c3c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb861e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8571c180 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:849c3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb68f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8561a38c r4:8561a000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8561a38c r4:856d7e80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:849c3c00 r8:856d7eac r7:82804d40 r6:dddced80 r5:dddceda0 r4:856d7e80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856d7e80 r8:80287e08 r7:eb825e60 r6:856d7f00 r5:849c3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb861fb0 to 0xeb861ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 dd60: 80230ad0 80239bb0 800f0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:84bbbf00 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:667:5368 blocked for more than 467 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:667 state:D stack:0 pid:5368 tgid:5368 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb885d84 r8:00000002 r7:60000113 r6:eb885d8c r5:849c5400 r4:849c5400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:849c5400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb885e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8571c600 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:849c5400 r7:00000000 r6:83018000 r5:00001000 r4:7f087000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7d9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8561ab8c r4:8561a800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8561ab8c r4:856d7f80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:849c5400 r8:856d7fac r7:82804d40 r6:dddced80 r5:dddceda0 r4:856d7f80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856d7f80 r8:80287e08 r7:eb861e60 r6:8571b000 r5:849c5400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb885fb0 to 0xeb885ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8571c000 INFO: task kworker/0:667:5368 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: db59d000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:e05addc0 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb891e08 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xeb891fb0 to 0xeb891ff8) task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8571c700 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:849c6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb809000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8561af8c r4:8561ac00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8561af8c r4:8571b180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:849c6c00 r8:8571b1ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8571b180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8571b180 r8:80287e08 r7:eb885e60 r6:8571b200 r5:849c6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb871fb0 to 0xeb871ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8571c480 INFO: task kworker/0:669:5372 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: dbdee000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r4:84bbbf00 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-rc7-syzkaller #0 r4:849c6000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb895e08 r5:00001000 r4:eb82f000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:8571b280 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:671:5375 blocked for more than 467 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb855000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8561b78c r4:8561b400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8561b78c r4:8571b380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856e8c00 r8:8571b3ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8571b380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8571b380 r8:80287e08 r7:eb895e60 r6:8571b400 r5:856e8c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8a9fb0 to 0xeb8a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8571c740 INFO: task kworker/0:671:5375 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r5:800f0013 r4:80239bb0 r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb86d000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:8571b480 Exception stack(0xeb8b5fb0 to 0xeb8b5ff8) task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:673:5380 blocked for more than 467 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:673 state:D stack:0 pid:5380 tgid:5380 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb8c1d84 r8:00000002 r7:60000013 r6:eb8c1d8c r5:85565400 r4:85565400 [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8578c38c r4:8578c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8578c38c r4:8571b580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85565400 r8:8571b5ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8571b580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8571b580 r8:80287e08 r7:eb8b5e60 r6:856a7b80 r5:85565400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8c1fb0 to 0xeb8c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8571cbc0 INFO: task kworker/0:673:5380 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: dc3e6000 dfb0b000 00000001 80239b98 7f2f9000 00000001 r5:800f0013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 Exception stack(0xe05adfb0 to 0xe05adff8) INFO: task kworker/0:674:5382 blocked for more than 467 seconds. r5:85566c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8d9e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8571ce80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85566c00 r7:00000000 r6:83018000 r5:00001000 r4:7f091000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xeb8d9fb0 to 0xeb8d9ff8) task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:800f0013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-rc7-syzkaller #0 [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8e5e08 r5:00001000 r4:eba4b000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:8571b680 Exception stack(0xeb8e5fb0 to 0xeb8e5ff8) task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:676:5385 blocked for more than 467 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:676 state:D stack:0 pid:5385 tgid:5385 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eba25d84 r8:00000002 r7:60000113 r6:eba25d8c r5:85561800 r4:85561800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85561800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba25e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8571f040 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85561800 r7:00000000 r6:83018000 r5:00001000 r4:7f095000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8d5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8578c78c r4:8578c400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8578c78c r4:8571b700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85561800 r8:8571b72c r7:82804d40 r6:dddced80 r5:dddceda0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Exception stack(0xe05add28 to 0xe05add70) r4:82ac21e4 r4:00000000 r5:84be078c r4:84be0400 r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 INFO: task kworker/0:677:5387 blocked for more than 467 seconds. r4:85560c00 [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eba27000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8578cb8c r4:8578c800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8578cb8c r4:8571b780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85560c00 r8:8571b7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8571b780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8571b780 r8:80287e08 r7:eb8e5e60 r6:856a7d80 r5:85560c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba31fb0 to 0xeba31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8571f280 INFO: task kworker/0:677:5387 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: dcd05000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 INFO: task kworker/0:678:5389 blocked for more than 467 seconds. r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba3de08 r5:00001000 r4:eba33000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:8571b800 r8:80287e08 r7:eb8e5e60 r6:856a7e00 r5:85556000 r4:8571f3c0 Call trace: dd20: dd2b2000 dfb0b000 00000001 80239b98 7f2f9000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eba3f000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:8571b880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8571b880 r8:80287e08 r7:eb8e5e60 r6:856a7e80 r5:85750000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba55fb0 to 0xeba55ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8571f440 INFO: task kworker/0:679:5392 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: dd89e000 dfb0b000 00000001 80239b98 7f2f9000 00000001 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba65e08 r5:8578db8c r4:8578d800 r4:8571f4c0 r4:82ac21e4 r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 Workqueue: events bpf_prog_free_deferred r5:00001000 r4:eba6f000 r10:61c88647 r9:85753000 r8:8571b9ac r7:82804d40 r6:dddced80 r5:dddceda0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8571f4c0 INFO: task kworker/0:681:5396 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: ddda5000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:682:5397 blocked for more than 467 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:682 state:D stack:0 pid:5397 tgid:5397 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eba75d84 r8:00000002 r7:60000113 r6:eba75d8c r5:85750c00 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8571fa80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: dd20: ddda5000 dfb0b000 00000001 80239b98 7f2f9000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:8291a684 r9:eba8dd84 r8:00000002 r7:60000113 r6:eba8dd8c r5:85752400 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:85752400 r8:8571baac r7:82804d40 r6:dddced80 r5:dddceda0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe05add28 to 0xe05add70) r5:800f0013 r4:80239bb0 r4:e05addc0 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:684:5401 blocked for more than 467 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:684 state:D stack:0 pid:5401 tgid:5401 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eba99d84 r8:00000002 r7:60000113 r6:eba99d8c r5:85753c00 r4:85753c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85753c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba99e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8571fc00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85753c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0ab000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba8f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8578e78c r4:8578e400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8578e78c r4:8571bb00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85753c00 r8:8571bb2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8571bb00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8571bb00 r8:80287e08 r7:eba8de60 r6:8572b100 r5:85753c00 r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:82ac21e4 r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 task:kworker/0:685 state:D stack:0 pid:5404 tgid:5404 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8571fd40 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:85754800 r8:8571bbac r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:686 state:D stack:0 pid:5405 tgid:5405 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebab9d84 r8:00000002 r7:60000013 r6:ebab9d8c r5:85755400 r4:85755400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85755400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebab9e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85736480 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85755400 r7:00000000 r6:83018000 r5:00001000 r4:7f02f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaeed000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8579078c r4:85790400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8579078c r4:8571bc00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85755400 r8:8571bc2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8571bc00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8571bc00 r8:80287e08 r7:eba8de60 r6:8572b200 r5:85755400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebab9fb0 to 0xebab9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8571fbc0 INFO: task kworker/0:686:5405 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: de374000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:85756000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebac9e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8571fd00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85756000 r7:00000000 r6:83018000 r5:00001000 r4:7f0b1000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebabf000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8578f38c r4:8578f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8578f38c r4:8571bc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xe05adfb0 to 0xe05adff8) Not tainted 6.15.0-rc7-syzkaller #0 r5:85758000 r4:8291a680 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 r4:00000000 r5:84be078c r4:84be0400 r4:00000001 dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:689:5411 blocked for more than 468 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:689 state:D stack:0 pid:5411 tgid:5411 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb901d84 r8:00000002 r7:60000013 r6:eb901d8c r5:85758c00 r4:85758c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85758c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb901e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8571cf80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85758c00 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00c7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8578fb8c r4:8578f800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8578fb8c r4:8571bd80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85758c00 r8:8571bdac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8571bd80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8571bd80 r8:80287e08 r7:ebab9e60 r6:8572b380 r5:85758c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb901fb0 to 0xeb901ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8571ff40 INFO: task kworker/0:689:5411 is blocked on a mutex likely owned by task kworker/1:202:3656. task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84afe000 r8:80200be4 r7:e05add5c r6:ffffffff r5:84afe000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05add28 to 0xe05add70) dd20: def79000 dfb0b000 00000001 80239b98 7f2f9000 00000001 dd40: 82ac15a0 7f2f9000 dfb0b000 8280c928 82ac21c4 e05adda4 e05adda8 e05add78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xe05adfb0 to 0xe05adff8) INFO: task kworker/0:690:5413 blocked for more than 468 seconds. [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8578ff8c r4:8578fc00 r10:61c88647 r9:8575a400 r8:8571be2c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05addc0 r5:e05ade08 r4:e05addc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be078c r4:84be0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be078c r4:84bbbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bbbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbbf00 r8:80287e08 r7:e058de60 r6:84bbe300 r5:84afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba87c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:691:5415 blocked for more than 468 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:691 state:D stack:0 pid:5415 tgid:5415 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb959d84 r8:00000002 r7:60000113 r6:eb959d8c r5:85759800 r4:85759800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85759800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb959e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85736340 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85759800 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac6d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8579038c r4:85790000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8579038c r4:8571be80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:8571be80 r8:80287e08 r7:ebab9e60 r6:8572b480 r5:85759800 task:kworker/1:202 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r5:00001000 r4:dfd07000 r10:61c88647 r9:84afe000 r8:84bbbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85736780 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85790f8c r4:85790c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85790f8c r4:8571bf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8575bc00 r8:8571bf2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8571bf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8571bf00 r8:80287e08 r7:ebab9e60 r6:8572b500 r5:8575bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb961fb0 to 0xeb961ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857362c0 INFO: task kworker/0:692:5418 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: 7f73d000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 900f0013 ffffffff r5:900f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:693:5419 blocked for more than 468 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:693 state:D stack:0 pid:5419 tgid:5419 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb975d84 r8:00000002 r7:60000013 r6:eb975d8c r5:8575c800 r4:8575c800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8575c800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/0:694:5422 blocked for more than 468 seconds. [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:85738000 r8:80287e08 r7:eb961e60 r6:8572b600 r5:8575d400 task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r5:00001000 r4:dfd53000 r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:695:5424 blocked for more than 468 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:695 state:D stack:0 pid:5424 tgid:5424 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb98dd84 r8:00000002 r7:60000013 r6:eb98dd8c r5:8575e000 r4:8575e000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8575e000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb98de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85736b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8575e000 r7:00000000 r6:83018000 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb305000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85791b8c r4:85791800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85791b8c r4:85738080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8575e000 r8:857380ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85738080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85738080 r8:80287e08 r7:eb981e60 r6:8572b680 r5:8575e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb98dfb0 to 0xeb98dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85736580 INFO: task kworker/0:695:5424 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: 7f89c000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 900f0013 ffffffff [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:85738100 Exception stack(0xeb611fb0 to 0xeb611ff8) task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:697:5430 blocked for more than 468 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:697 state:D stack:0 pid:5430 tgid:5430 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb9a5d84 r8:00000002 r7:60000013 r6:eb9a5d8c r5:85760000 r4:85760000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85760000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9a5e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85736800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Workqueue: events bpf_prog_free_deferred r5:900f0013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fa0: 00000000 00000000 00000000 00000000 [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85736d80 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:8579238c r4:85738200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85761800 r8:8573822c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85738200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85738200 r8:80287e08 r7:eb9a5e60 r6:8572b800 r5:85761800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9bdfb0 to 0xeb9bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85736cc0 INFO: task kworker/0:698:5432 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: 807c3000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:699:5433 blocked for more than 468 seconds. "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb607000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:85738280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85738280 r8:80287e08 r7:eb9a5e60 r6:85738300 r5:856ebc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba49fb0 to 0xeba49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85736b00 INFO: task kworker/0:699:5433 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: 807c3000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:85738380 task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8579378c r4:85793400 r4:85738480 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xe05c1d28 to 0xe05c1d70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:702:5440 blocked for more than 468 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:702 state:D stack:0 pid:5440 tgid:5440 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb9e1d84 r8:00000002 r7:60000013 r6:eb9e1d8c r5:856ee000 r4:856ee000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:856ee000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9e1e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85741040 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:856ee000 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb751000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8579338c r4:85793000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8579338c r4:85738580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856ee000 r8:857385ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85738580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85738580 r8:80287e08 r7:eb9d5e60 r6:85738600 r5:856ee000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9e1fb0 to 0xeb9e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85741300 INFO: task kworker/0:702:5440 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: 80d0f000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 r4:e05c1dc0 r5:00001000 r4:dfd53000 r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 Exception stack(0xe05c1fb0 to 0xe05c1ff8) Not tainted 6.15.0-rc7-syzkaller #0 r10:8291a684 r9:eb9edd84 r8:00000002 r7:60000113 r6:eb9edd8c r5:856eec00 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85793b8c r4:85793800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856eec00 r8:857386ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85738680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85738680 r8:80287e08 r7:eb9d5e60 r6:85738700 r5:856eec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9edfb0 to 0xeb9edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85741300 INFO: task kworker/0:703:5442 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: 81146000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb91b000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:85793f8c r4:85738780 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 1d60: 80230ad0 80239bb0 800f0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-rc7-syzkaller #0 r10:8291a684 r9:eba05d84 r8:00000002 r7:60000113 r6:eba05d8c r5:856ea400 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xeba05fb0 to 0xeba05ff8) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857412c0 INFO: task kworker/0:705:5446 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: 81566000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:451:5448 blocked for more than 468 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:451 state:D stack:0 pid:5448 tgid:5448 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebad1d84 r8:00000002 r7:60000113 r6:ebad1d8c r5:85763000 r4:85763000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85763000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebad1e08 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8552ef8c r4:8552ec00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r5:800f0013 r4:80239bb0 r4:e05c1dc0 r5:00001000 r4:dfd53000 r4:84bb2000 Exception stack(0xe05c1fb0 to 0xe05c1ff8) Not tainted 6.15.0-rc7-syzkaller #0 r4:85760c00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebad9e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85741940 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85760c00 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb95d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8579478c r4:85794400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8579478c r4:85738980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85760c00 r8:857389ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85738980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85738980 r8:80287e08 r7:eba05e60 r6:8572b980 r5:85760c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebad9fb0 to 0xebad9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85741680 INFO: task kworker/0:706:5450 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: 81e9d000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) r4:84ba8980 Workqueue: events bpf_prog_free_deferred [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85794b8c r4:85794800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85794b8c r4:85738a00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85762400 r8:85738a2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85738a00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85738a00 r8:80287e08 r7:ebad9e60 r6:8572ba00 r5:85762400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebae1fb0 to 0xebae1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857417c0 INFO: task kworker/0:707:5452 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) 1d60: 80230ad0 80239bb0 800f0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:708 state:D stack:0 pid:5453 tgid:5453 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebae5e08 r5:00001000 r4:eb9ad000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857417c0 INFO: task kworker/0:708:5453 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: 821f3000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Not tainted 6.15.0-rc7-syzkaller #0 r5:85766000 r4:8291a680 r4:00000000 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8579638c r4:85796000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xebaedfb0 to 0xebaedff8) r4:85741a00 r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r5:00001000 r4:dfd53000 r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:710:5456 blocked for more than 468 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:710 state:D stack:0 pid:5456 tgid:5456 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebaf1d84 r8:00000002 r7:60000113 r6:ebaf1d8c r5:85764800 r4:85764800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85764800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebaf1e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85741d40 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85764800 r7:00000000 r6:83018000 r5:00001000 r4:7f059000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb9f5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8579538c r4:85795000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8579538c r4:85738b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85764800 r8:85738bac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85738b80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85738b80 r8:80287e08 r7:ebaede60 r6:8572bb80 r5:85764800 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:85766c00 r4:8291a680 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85741e80 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:85766c00 r8:85738c2c r7:82804d40 r6:dddced80 r5:dddceda0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85741bc0 INFO: task kworker/0:711:5460 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: 8291b000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) r4:84ba8980 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r5:800f0013 r4:80239bb0 r4:e05c1dc0 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:713 state:D stack:0 pid:5464 tgid:5464 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebb0dd84 r8:00000002 r7:60000013 r6:ebb0dd8c r5:8555bc00 r4:8555bc00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8555bc00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb0de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85736700 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8555bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f05f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb0f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85795f8c r4:85795c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85795f8c r4:85738d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8555bc00 r8:85738dac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85738d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85738d80 r8:80287e08 r7:ebaede60 r6:85738e00 r5:8555bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb0dfb0 to 0xebb0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85736880 INFO: task kworker/0:713:5464 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r5:800f0013 r4:80239bb0 r5:00001000 r4:dfd53000 r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 Not tainted 6.15.0-rc7-syzkaller #0 r4:85765400 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb29e08 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:85765400 r8:8572bcac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:82ac21e4 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:714:5468 blocked for more than 468 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:714 state:D stack:0 pid:5468 tgid:5468 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebb39d84 r8:00000002 r7:60000113 r6:ebb39d8c r5:85768c00 r4:85768c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85768c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb39e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857c8280 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85768c00 r7:00000000 r6:83018000 r5:00001000 r4:7f09f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb2b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8579678c r4:85796400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8579678c r4:85738e80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85768c00 r8:85738eac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85738e80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85738e80 r8:80287e08 r7:ebaede60 r6:8572bd80 r5:85768c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xe05c1d28 to 0xe05c1d70) r4:82ac21e4 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-rc7-syzkaller #0 r10:8291a684 r9:ebb45d84 r8:00000002 r7:60000013 r6:ebb45d8c r5:85769800 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85797b8c r4:85797800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 1d20: 836c1000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:716:5470 blocked for more than 468 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:716 state:D stack:0 pid:5470 tgid:5470 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebb49d84 r8:00000002 r7:60000013 r6:ebb49d8c r5:8576a400 r4:8576a400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8576a400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb49e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857c8440 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85796b8c r4:85796800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb59e08 r5:00001000 r4:ebb4f000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:857d5000 Exception stack(0xebb59fb0 to 0xebb59ff8) task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: 840bd000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:718:5474 blocked for more than 468 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:718 state:D stack:0 pid:5474 tgid:5474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebb69d84 r8:00000002 r7:60000113 r6:ebb69d8c r5:8576b000 r4:8576b000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8576b000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857c86c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8576b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0b3000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb5f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8579738c r4:85797000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8579738c r4:857d5080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8576b000 r8:857d50ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:857d5080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857d5080 r8:80287e08 r7:ebb45e60 r6:8572bf80 r5:8576b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb69fb0 to 0xebb69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857c8400 INFO: task kworker/0:718:5474 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: 840bd000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings task:kworker/0:719 state:D stack:0 pid:5476 tgid:5476 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:84b18000 r7:00000000 r6:83018000 r5:00001000 r4:7f0b5000 r5:8579778c r4:85797400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:857d5100 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 1d20: 845c4000 dfb47000 00000001 80239b98 7f2fb000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:720:5479 blocked for more than 468 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:720 state:D stack:0 pid:5479 tgid:5479 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebb79d84 r8:00000002 r7:60000013 r6:ebb79d8c r5:84b18c00 r4:84b18c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb79e08 r5:85797f8c r4:85797c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe05c1d28 to 0xe05c1d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r5:00001000 r4:dfd53000 r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8579c38c r4:8579c000 r10:61c88647 r9:84b19800 r8:857d532c r7:82804d40 r6:dddced80 r5:dddceda0 r4:857d5300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857d5300 r8:80287e08 r7:ebb79e60 r6:857d5380 r5:84b19800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb85fb0 to 0xebb85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857c8940 INFO: task kworker/0:721:5481 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: 845c4000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:722:5484 blocked for more than 468 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:722 state:D stack:0 pid:5484 tgid:5484 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebb91d84 r8:00000002 r7:60000013 r6:ebb91d8c r5:84b1a400 r4:84b1a400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b1a400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:8579c78c r4:8579c400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: 1d20: 84d83000 dfb47000 00000001 80239b98 7f2fb000 00000001 r4:e05c1dc0 r5:00001000 r4:dfd53000 r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:ebbaf000 r5:8579cb8c r4:8579c800 r7:dddced80 r6:83018000 r5:8579cb8c r4:857d5500 r10:00000000 r9:857d5500 r8:80287e08 r7:ebb91e60 r6:857d5580 r5:84b1b000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857c8b80 INFO: task kworker/0:723:5485 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: 852a8000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-rc7-syzkaller #0 r5:84b1bc00 r4:8291a680 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85740380 r5:8579cf8c r4:8579cc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84b1bc00 r8:857d562c r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: 852a8000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Not tainted 6.15.0-rc7-syzkaller #0 r4:84b1c800 r4:00000000 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8579d78c r4:8579d400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:857d5700 r8:80287e08 r7:ebbade60 r6:857d5780 r5:84b1c800 INFO: task kworker/0:725:5489 is blocked on a mutex likely owned by task kworker/1:204:3660. 1d60: 80230ad0 80239bb0 800f0013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:84bb2000 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebbc5d84 r8:00000002 r7:60000013 r6:ebbc5d8c r5:84b1d400 r4:84b1d400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b1d400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbc5e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857c8fc0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84b1d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0c3000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebbc7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8579d38c r4:8579d000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8579d38c r4:857d5800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b1d400 r8:857d582c r7:82804d40 r6:dddced80 r5:dddceda0 r4:857d5800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857d5800 r8:80287e08 r7:ebbb9e60 r6:857d5880 r5:84b1d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebbc5fb0 to 0xebbc5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857ec040 INFO: task kworker/0:726:5491 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: 85998000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:727:5493 blocked for more than 468 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:727 state:D stack:0 pid:5493 tgid:5493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebbd1d84 r8:00000002 r7:60000113 r6:ebbd1d8c r5:84b1e000 r4:84b1e000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857ec4c0 r5:8579df8c r4:8579dc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84b1e000 r8:857d592c r7:82804d40 r6:dddced80 r5:dddceda0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 1d60: 80230ad0 80239bb0 800f0013 ffffffff r4:e05c1dc0 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:84ba8980 Workqueue: events bpf_prog_free_deferred r10:8291a684 r9:ebbf9d84 r8:00000002 r7:60000013 r6:ebbf9d8c r5:8576c800 r4:8576c800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8576c800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbf9e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857ec640 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8576c800 r7:00000000 r6:83018000 r5:00001000 r4:7f0cb000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebbf3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8579e38c r4:8579e000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8579e38c r4:857d5a00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8576c800 r8:857d5a2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:857d5a00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857d5a00 r8:80287e08 r7:ebbd1e60 r6:857f5000 r5:8576c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebbf9fb0 to 0xebbf9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857ec340 INFO: task kworker/0:728:5496 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: 85d7a000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 r4:84bb2000 Exception stack(0xe05c1fb0 to 0xe05c1ff8) r4:84ba8980 Workqueue: events bpf_prog_free_deferred r5:8576e000 r4:8291a680 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857ecc40 r5:8579f78c r4:8579f400 r7:dddced80 r6:83018000 r5:8579f78c r4:857d5a80 r10:61c88647 r9:8576e000 r8:857d5aac r7:82804d40 r6:dddced80 r5:dddceda0 r4:857d5a80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857d5a80 r8:80287e08 r7:ebbf9e60 r6:857f5080 r5:8576e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8cdfb0 to 0xeb8cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857ec440 INFO: task kworker/0:729:5498 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: 86261000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:730:5500 blocked for more than 468 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:730 state:D stack:0 pid:5500 tgid:5500 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eba2dd84 r8:00000002 r7:60000113 r6:eba2dd8c r5:8576bc00 r4:8576bc00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8576bc00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857ec780 r5:8579e78c r4:8579e400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:857d5b00 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xe05c1d28 to 0xe05c1d70) [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857ec8c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8576d400 r7:00000000 r6:83018000 r5:00001000 r4:7f063000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfebb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8579eb8c r4:8579e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8579eb8c r4:857d5b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8576d400 r8:857d5bac r7:82804d40 r6:dddced80 r5:dddceda0 r4:857d5b80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857d5b80 r8:80287e08 r7:eb8cde60 r6:857f5180 r5:8576d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba45fb0 to 0xeba45ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857ec600 INFO: task kworker/0:731:5502 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: 86650000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r4:00000000 r5:84be0b8c r4:84be0800 r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:8291a684 r9:eba51d84 r8:00000002 r7:60000013 r6:eba51d8c r5:8576ec00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba51e08 r5:00001000 r4:e0691000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8579ef8c r4:8579ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8579ef8c r4:857d5c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8576ec00 r8:857d5c2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:857d5c00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857d5c00 r8:80287e08 r7:eb8cde60 r6:857f5200 r5:8576ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba51fb0 to 0xeba51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857ec740 INFO: task kworker/0:732:5503 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) 1d60: 80230ad0 80239bb0 800f0013 ffffffff r4:e05c1dc0 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 INFO: task kworker/0:733:5505 blocked for more than 468 seconds. r5:85756c00 r4:8291a680 r4:00000000 r4:00000000 r5:8579f38c r4:8579f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85756c00 r8:857d5cac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xe05c1d28 to 0xe05c1d70) [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r5:84be0b8c r4:84be0800 r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:734:5507 blocked for more than 468 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:734 state:D stack:0 pid:5507 tgid:5507 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eba85d84 r8:00000002 r7:60000113 r6:eba85d8c r5:856f8c00 r4:856f8c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:856f8c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba85e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857ece00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:856f8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f06b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae01000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8579fb8c r4:8579f800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8579fb8c r4:857d5d00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856f8c00 r8:857d5d2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:857d5d00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857d5d00 r8:80287e08 r7:eb8cde60 r6:857f5300 r5:856f8c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba85fb0 to 0xeba85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857ecb80 INFO: task kworker/0:734:5507 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Call trace: 1d20: 86f9e000 dfb47000 00000001 80239b98 7f2fb000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:735:5510 blocked for more than 468 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:735 state:D stack:0 pid:5510 tgid:5510 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eba95d84 r8:00000002 r7:60000013 r6:eba95d8c r5:856f9800 r4:856f9800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:856f9800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba95e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857ec180 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:856f9800 r7:00000000 r6:83018000 r5:00001000 r4:7f071000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb39d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857a038c r4:857a0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857a038c r4:857d5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856f9800 r8:857d5dac r7:82804d40 r6:dddced80 r5:dddceda0 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 Exception stack(0xe05c1fb0 to 0xe05c1ff8) r4:84ba8980 Workqueue: events bpf_prog_free_deferred r5:856fa400 r4:8291a680 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:737:5514 blocked for more than 468 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:737 state:D stack:0 pid:5514 tgid:5514 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebbddd84 r8:00000002 r7:60000013 r6:ebbddd8c r5:856fb000 r4:856fb000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:856fb000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbdde08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85800040 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:856fb000 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb479000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857a078c r4:857a0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r5:84be0b8c r4:84be0800 r4:84bb2000 Exception stack(0xe05c1fb0 to 0xe05c1ff8) r4:84ba8980 Workqueue: events bpf_prog_free_deferred [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r9:83018005 r8:856fbc00 r7:00000000 r6:83018000 r5:00001000 r4:7f075000 r5:857a0b8c r4:857a0800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xe05c1d28 to 0xe05c1d70) r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:739:5519 blocked for more than 468 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:739 state:D stack:0 pid:5519 tgid:5519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebc09d84 r8:00000002 r7:60000113 r6:ebc09d8c r5:856fe000 r4:856fe000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:856fe000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc09e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85800480 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:856fe000 r7:00000000 r6:83018000 r5:00001000 r4:7f077000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb54f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857a0f8c r4:857a0c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857a0f8c r4:857d5f80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856fe000 r8:857d5fac r7:82804d40 r6:dddced80 r5:dddceda0 r4:857d5f80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857d5f80 r8:80287e08 r7:ebc05e60 r6:857f5580 r5:856fe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc09fb0 to 0xebc09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:858001c0 INFO: task kworker/0:739:5519 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: 87b09000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 r4:84bb2000 r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:84ba8980 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8552f78c r4:8552f400 r10:61c88647 r9:856fec00 r8:857f562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:82ac21e4 r4:e05c1dc0 r5:00001000 r4:dfd53000 r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:740:5522 blocked for more than 468 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:740 state:D stack:0 pid:5522 tgid:5522 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebc15d84 r8:00000002 r7:60000113 r6:ebc15d8c r5:856fd400 r4:856fd400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:856fd400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc15e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85800800 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:856fd400 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb6d1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857a1b8c r4:857a1800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857a1b8c r4:857fd000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856fd400 r8:857fd02c r7:82804d40 r6:dddced80 r5:dddceda0 r4:857fd000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857fd000 r8:80287e08 r7:ebc09e60 r6:857f5700 r5:856fd400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc15fb0 to 0xebc15ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85800300 INFO: task kworker/0:740:5522 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: Exception stack(0xe05c1d28 to 0xe05c1d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 INFO: task kworker/0:741:5523 blocked for more than 468 seconds. r4:856fc800 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc19e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85800540 r5:857a138c r4:857a1000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857a138c r4:857fd080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856fc800 r8:857fd0ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:857fd080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857fd080 r8:80287e08 r7:ebc15e60 r6:857f5780 r5:856fc800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc19fb0 to 0xebc19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85800300 INFO: task kworker/0:741:5523 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: 885fe000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xe05c1fb0 to 0xe05c1ff8) Not tainted 6.15.0-rc7-syzkaller #0 r5:856f8000 r4:8291a680 r4:00000000 r4:00000000 r5:857a178c r4:857a1400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fa0: 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:82ac21e4 r4:e05c1dc0 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:84ba8980 Workqueue: events bpf_prog_free_deferred r5:85770c00 r4:8291a680 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85800fc0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85770c00 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba41000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857a338c r4:857a3000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857a338c r4:857fd180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85770c00 r8:857fd1ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:857fd180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857fd180 r8:80287e08 r7:ebc15e60 r6:857f5880 r5:85770c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc29fb0 to 0xebc29ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:858004c0 INFO: task kworker/0:743:5527 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: 885fe000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc31e08 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:857a1f8c r4:857a1c00 r10:61c88647 r9:85772400 r8:857fd22c r7:82804d40 r6:dddced80 r5:dddceda0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/0:744:5529 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: 88d09000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:745:5532 blocked for more than 469 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:745 state:D stack:0 pid:5532 tgid:5532 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebc65d84 r8:00000002 r7:60000013 r6:ebc65d8c r5:85771800 r4:85771800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85771800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc65e08 r4:00000000 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:857a238c r4:857a2000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85771800 r8:857fd2ac r7:82804d40 r6:dddced80 r5:dddceda0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: 88e6b000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xe05c1fb0 to 0xe05c1ff8) r4:84ba8980 Workqueue: events bpf_prog_free_deferred r5:85773c00 r4:8291a680 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:857a278c r4:857a2400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xe05c1d28 to 0xe05c1d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:84ba8980 task:kworker/0:747 state:D stack:0 pid:5535 tgid:5535 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba7de08 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:857a2b8c r4:857a2800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857a2b8c r4:857fd380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844e8c00 r8:857fd3ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:857fd380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857fd380 r8:80287e08 r7:ebc29e60 r6:857fd400 r5:844e8c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba7dfb0 to 0xeba7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85800a00 INFO: task kworker/0:747:5535 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: 88e6b000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.15.0-rc7-syzkaller #0 r10:8291a684 r9:ebc71d84 r8:00000002 r7:60000013 r6:ebc71d8c r5:844e9800 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc71e08 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:857a2f8c r4:857a2c00 r10:61c88647 r9:844e9800 r8:857fd4ac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 r5:800f0013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:749:5540 blocked for more than 469 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:749 state:D stack:0 pid:5540 tgid:5540 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebc75d84 r8:00000002 r7:60000013 r6:ebc75d8c r5:844ea400 r4:844ea400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:844ea400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc75e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857ece80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:844ea400 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba81000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857a3b8c r4:857a3800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857a3b8c r4:857fd580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844ea400 r8:857fd5ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:857fd580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857fd580 r8:80287e08 r7:ebc29e60 r6:857fd600 r5:844ea400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc75fb0 to 0xebc75ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857dcd00 INFO: task kworker/0:749:5540 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: 894a1000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r4:844eb000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:844eb000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc79e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857dc9c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:844eb000 r7:00000000 r6:83018000 r5:00001000 r4:7f08b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba5d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857a378c r4:857a3400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857a378c r4:857fd680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844eb000 r8:857fd6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:857fd680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857fd680 r8:80287e08 r7:ebc75e60 r6:857fd700 r5:844eb000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc79fb0 to 0xebc79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857dcd00 INFO: task kworker/0:750:5541 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: 897d8000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 r5:00001000 r4:dfd53000 r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fa0: 00000000 00000000 00000000 00000000 r10:8291a684 r9:ebc7dd84 r8:00000002 r7:60000013 r6:ebc7dd8c r5:844ebc00 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:857ac38c r4:857fd780 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred Exception stack(0xe05c1d28 to 0xe05c1d70) [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:752:5547 blocked for more than 469 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:752 state:D stack:0 pid:5547 tgid:5547 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebc89d84 r8:00000002 r7:60000113 r6:ebc89d8c r5:844ec800 r4:844ec800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:844ec800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc89e08 r4:00000000 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:857a3f8c r4:857a3c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: 1d60: 80230ad0 80239bb0 800f0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xe05c1fb0 to 0xe05c1ff8) INFO: task kworker/0:753:5548 blocked for more than 469 seconds. r5:844ed400 r4:8291a680 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8581b540 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:844ed400 r7:00000000 r6:83018000 r5:00001000 r4:7f093000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc91000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857ac78c r4:857ac400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857ac78c r4:857fd980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844ed400 r8:857fd9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:857fd980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857fd980 r8:80287e08 r7:ebc7de60 r6:857fda00 r5:844ed400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb955fb0 to 0xeb955ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8581b240 INFO: task kworker/0:753:5548 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: 89cf2000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:754:5551 blocked for more than 469 seconds. Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc8de08 r5:00001000 r4:ebcb1000 r5:857acf8c r4:857acc00 r7:dddced80 r6:83018000 r5:857acf8c r4:857fda80 r10:00000000 r9:857fda80 r8:80287e08 r7:eb955e60 r6:857fdb00 r5:844ee000 task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: 89cf2000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:755:5552 blocked for more than 469 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:755 state:D stack:0 pid:5552 tgid:5552 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebca5d84 r8:00000002 r7:60000113 r6:ebca5d8c r5:844eec00 r4:844eec00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:844eec00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebca5e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8581b640 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:857acb8c r4:857ac800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:857fdb80 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe05c1d28 to 0xe05c1d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r5:84be0b8c r4:84be0800 r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:756:5555 blocked for more than 469 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:756 state:D stack:0 pid:5555 tgid:5555 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebcb5d84 r8:00000002 r7:60000113 r6:ebcb5d8c r5:844e8000 r4:844e8000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:844e8000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebcb5e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8581b940 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:844e8000 r7:00000000 r6:83018000 r5:00001000 r4:7f099000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebcbd000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:857ad38c r4:857ad000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857ad38c r4:857fdc80 r4:857fdc80 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe05c1d28 to 0xe05c1d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r5:84be0b8c r4:84be0800 r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r9:83018005 r8:85773000 r7:00000000 r6:83018000 r5:00001000 r4:7f09b000 r5:857ad78c r4:857ad400 r10:61c88647 r9:85773000 r8:857fddac r7:82804d40 r6:dddced80 r5:dddceda0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: 8a284000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:758:5558 blocked for more than 469 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:758 state:D stack:0 pid:5558 tgid:5558 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebcc1d84 r8:00000002 r7:60000013 r6:ebcc1d8c r5:84b1ec00 r4:84b1ec00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:857ae38c r4:857ae000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857ae38c r4:857fde00 r4:857fde00 1fa0: 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe05c1d28 to 0xe05c1d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xe05c1fb0 to 0xe05c1ff8) INFO: task kworker/0:759:5560 blocked for more than 469 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:759 state:D stack:0 pid:5560 tgid:5560 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebc95d84 r8:00000002 r7:60000113 r6:ebc95d8c r5:848d0000 r4:848d0000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848d0000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc95e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8581bc00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:848d0000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebce3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857adb8c r4:857ad800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857adb8c r4:857fdf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848d0000 r8:857fdf2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:857fdf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857fdf00 r8:80287e08 r7:ebcc1e60 r6:857fdf80 r5:848d0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc95fb0 to 0xebc95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8581b980 INFO: task kworker/0:759:5560 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: 8a7f8000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d60: 80230ad0 80239bb0 800f0013 ffffffff r4:e05c1dc0 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84bb2000 Exception stack(0xe05c1fb0 to 0xe05c1ff8) r4:84ba8980 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8581bdc0 r5:857adf8c r4:857adc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 INFO: task kworker/0:760:5562 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: 8ab1b000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Not tainted 6.15.0-rc7-syzkaller #0 r4:848d1800 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85800e00 r5:857ae78c r4:857ae400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:8582b100 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:800f0013 r4:80239bb0 r4:00000000 r5:84be0b8c r4:84be0800 r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:762:5566 blocked for more than 469 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:762 state:D stack:0 pid:5566 tgid:5566 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec509d84 r8:00000002 r7:60000113 r6:ec509d8c r5:848d3000 r4:848d3000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848d3000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec509e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8582e040 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:848d3000 r7:00000000 r6:83018000 r5:00001000 r4:7f0ab000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec511000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857aeb8c r4:857ae800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857aeb8c r4:8582b200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848d3000 r8:8582b22c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8582b200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8582b200 r8:80287e08 r7:ebcf9e60 r6:8582b280 r5:848d3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec509fb0 to 0xec509ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8582e100 INFO: task kworker/0:762:5566 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: 8ae2b000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:763:5568 blocked for more than 469 seconds. r4:848d3c00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebcede08 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:857aef8c r4:857aec00 r7:dddced80 r6:83018000 r5:857aef8c r4:8582b300 r10:00000000 r9:8582b300 r8:80287e08 r7:ec509e60 r6:8582b380 r5:848d3c00 task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: 8b173000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:764:5570 blocked for more than 469 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:764 state:D stack:0 pid:5570 tgid:5570 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:848d2400 r4:8291a680 r4:00000000 r4:00000000 r5:857af38c r4:857af000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8582e080 INFO: task kworker/0:764:5570 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: 8b173000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d60: 80230ad0 80239bb0 800f0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fa0: 00000000 00000000 00000000 00000000 Call trace: [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:857afb8c r4:857af800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857afb8c r4:8582b500 r10:61c88647 r9:848d4800 r8:8582b52c r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:766:5573 blocked for more than 469 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:766 state:D stack:0 pid:5573 tgid:5573 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec545d84 r8:00000002 r7:60000013 r6:ec545d8c r5:848d6000 r4:848d6000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848d6000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec545e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8582e7c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:848d6000 r7:00000000 r6:83018000 r5:00001000 r4:7f0cd000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec531000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857af78c r4:857af400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857af78c r4:8582b580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848d6000 r8:8582b5ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8582b580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8582b580 r8:80287e08 r7:ec53de60 r6:8582b680 r5:848d6000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec545fb0 to 0xec545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8582e0c0 INFO: task kworker/0:766:5573 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: 8b436000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:767:5576 blocked for more than 469 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:767 state:D stack:0 pid:5576 tgid:5576 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec515d84 r8:00000002 r7:60000013 r6:ec515d8c r5:848d6c00 r4:848d6c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848d6c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:857aff8c r4:857afc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:8582b700 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred 1d60: 80230ad0 80239bb0 800f0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:84ba8980 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:848d5400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 r5:857b4b8c r4:857b4800 r10:61c88647 r9:848d5400 r8:8582b82c r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: 8b834000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:769:5580 blocked for more than 469 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:769 state:D stack:0 pid:5580 tgid:5580 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec565d84 r8:00000002 r7:60000113 r6:ec565d8c r5:85840000 r4:85840000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85840000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r4:00000000 r5:857b438c r4:857b4000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85840000 r8:8582b92c r7:82804d40 r6:dddced80 r5:dddceda0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:82ac21e4 r4:e05c1dc0 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:770:5581 blocked for more than 469 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:770 state:D stack:0 pid:5581 tgid:5581 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec549d84 r8:00000002 r7:60000013 r6:ec549d8c r5:85840c00 r4:85840c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85840c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec549e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8582eec0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85840c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec56d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857b478c r4:857b4400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857b478c r4:8582ba00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85840c00 r8:8582ba2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8582ba00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8582ba00 r8:80287e08 r7:ec55de60 r6:8582ba80 r5:85840c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec549fb0 to 0xec549ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8582ea80 INFO: task kworker/0:770:5581 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: 8bdf9000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 r4:84bb2000 Exception stack(0xe05c1fb0 to 0xe05c1ff8) INFO: task kworker/0:771:5584 blocked for more than 469 seconds. r4:85841800 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec571e08 r9:83018005 r8:85841800 r7:00000000 r6:83018000 r5:00001000 r4:7f0d9000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec585000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857b4f8c r4:857b4c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857b4f8c r4:8582bb00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85841800 r8:8582bb2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8582bb00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8582bb00 r8:80287e08 r7:ec55de60 r6:8582bb80 r5:85841800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec571fb0 to 0xec571ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:844fa000 INFO: task kworker/0:771:5584 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: 8be3b000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:857b638c r4:857b6000 r10:61c88647 r9:85842400 r8:8582bc2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:844fa280 [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r5:84be0b8c r4:84be0800 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:857b538c r4:857b5000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:8582bd00 r8:80287e08 r7:ec589e60 r6:8582bd80 r5:85843000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 1d60: 80230ad0 80239bb0 800f0013 ffffffff [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:774:5590 blocked for more than 469 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:774 state:D stack:0 pid:5590 tgid:5590 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec5b1d84 r8:00000002 r7:60000113 r6:ec5b1d8c r5:85844800 r4:85844800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85844800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec5b1e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844fa580 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85844800 r7:00000000 r6:83018000 r5:00001000 r4:7f0df000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec5a9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857b578c r4:857b5400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857b578c r4:8582be00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85844800 r8:8582be2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8582be00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8582be00 r8:80287e08 r7:ec589e60 r6:8582be80 r5:85844800 1fa0: 00000000 00000000 00000000 00000000 [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r4:82ac21e4 r4:00000000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ec5bd000 r5:8552fb8c r4:8552f800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8552fb8c r4:857f5b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85776000 r8:857f5b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857f5b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857f5b00 r8:80287e08 r7:eb781e60 r6:857f5b80 r5:85776000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec5a1fb0 to 0xec5a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8479c400 INFO: task kworker/1:454:5591 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: 8ca0f000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Call trace: [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:857b5b8c r4:857b5800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85774800 r8:8582bf2c r7:82804d40 r6:dddced80 r5:dddceda0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r5:84be0b8c r4:84be0800 r4:84bb2000 Exception stack(0xe05c1fb0 to 0xe05c1ff8) r4:84ba8980 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec595d84 r8:00000002 r7:60000013 r6:ec595d8c r5:85776c00 r4:85776c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85776c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec595e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847cb440 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85776c00 r7:00000000 r6:83018200 r5:00001000 r4:7f069000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8471db8c r4:8471d800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8471db8c r4:857f5c80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85776c00 r8:857f5cac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857f5c80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857f5c80 r8:80287e08 r7:eb781e60 r6:857f5d00 r5:85776c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec595fb0 to 0xec595ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8479c680 INFO: task kworker/1:455:5597 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: 8cd38000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:85845400 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec5dde08 r9:83018005 r8:85845400 r7:00000000 r6:83018000 r5:00001000 r4:7f0e7000 r5:857b5f8c r4:857b5c00 r10:61c88647 r9:85845400 r8:8582bfac r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:82ac21e4 r4:e05c1dc0 r5:00001000 r4:dfd53000 r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:777 state:D stack:0 pid:5601 tgid:5601 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:85846000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85846000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec5d9e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844fad40 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85846000 r7:00000000 r6:83018000 r5:00001000 r4:7f0eb000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec5f1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857b678c r4:857b6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857b678c r4:8478b080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85846000 r8:8478b0ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8478b080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8478b080 r8:80287e08 r7:ec589e60 r6:8478b100 r5:85846000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec5d9fb0 to 0xec5d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:844faa40 INFO: task kworker/0:777:5601 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: 8d2a0000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:778:5603 blocked for more than 469 seconds. task:kworker/0:778 state:D stack:0 pid:5603 tgid:5603 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec5cde08 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85805f40 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85846c00 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e012f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857b738c r4:857b7000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857b738c r4:8478b180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85846c00 r8:8478b1ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8478b180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8478b180 r8:80287e08 r7:ec5d9e60 r6:8478b200 r5:85846c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec5cdfb0 to 0xec5cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:844faa40 INFO: task kworker/0:778:5603 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: 8d2a0000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r4:00000000 r5:84be0b8c r4:84be0800 r4:84bb2000 Exception stack(0xe05c1fb0 to 0xe05c1ff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:85843c00 r4:00000000 r4:00000000 r5:857b6b8c r4:857b6800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85843c00 r8:8478b2ac r7:82804d40 r6:dddced80 r5:dddceda0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:780:5607 blocked for more than 469 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:780 state:D stack:0 pid:5607 tgid:5607 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb999d84 r8:00000002 r7:60000013 r6:eb999d8c r5:85848c00 r4:85848c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85848c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb999e08 r4:00000000 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:857b6f8c r4:857b6c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857b6f8c r4:8478b380 r10:00000000 r9:8478b380 r8:80287e08 r7:ec5cde60 r6:8478b400 r5:85848c00 r4:844fa6c0 [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:8291a684 r9:ec601d84 r8:00000002 r7:60000113 r6:ec601d8c r5:85849800 r4:00000000 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:848c038c r4:8478b480 r10:00000000 r9:8478b480 r8:80287e08 r7:ec5cde60 r6:8478b500 r5:85849800 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: 8de0c000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:782:5610 blocked for more than 469 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:782 state:D stack:0 pid:5610 tgid:5610 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebaf5d84 r8:00000002 r7:60000113 r6:ebaf5d8c r5:8584a400 r4:8584a400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8584a400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebaf5e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849b33c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8584a400 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae7f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857b778c r4:857b7400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857b778c r4:8478b580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8584a400 r8:8478b5ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8478b580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8478b580 r8:80287e08 r7:ec601e60 r6:8478b600 r5:8584a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebaf5fb0 to 0xebaf5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:783:5614 blocked for more than 469 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:783 state:D stack:0 pid:5614 tgid:5614 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebb09d84 r8:00000002 r7:60000013 r6:ebb09d8c r5:8584bc00 r4:8584bc00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8584bc00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb09e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849b3500 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8584bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f02f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf6f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857b7b8c r4:857b7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857b7b8c r4:8478b680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8584bc00 r8:8478b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8478b680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8478b680 r8:80287e08 r7:ec601e60 r6:8478b700 r5:8584bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb09fb0 to 0xebb09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849b3380 INFO: task kworker/0:783:5614 is blocked on a mutex likely owned by task kworker/1:204:3660. r4:00000000 1d60: 80230ad0 80239bb0 800f0013 ffffffff r4:e05c1dc0 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:784:5615 blocked for more than 469 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:784 state:D stack:0 pid:5615 tgid:5615 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebb15d84 r8:00000002 r7:60000113 r6:ebb15d8c r5:8584c800 r4:8584c800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8584c800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb15e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849b3700 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8584c800 r7:00000000 r6:83018000 r5:00001000 r4:7f031000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:857b7f8c r4:857b7c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:8584c800 r8:8478b7ac r7:82804d40 r6:dddced80 r5:dddceda0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:849b3640 INFO: task kworker/0:784:5615 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: 8e09f000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8471df8c r4:8471dc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xeb9c9fb0 to 0xeb9c9ff8) Workqueue: events bpf_prog_free_deferred Exception stack(0xe05c1d28 to 0xe05c1d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 INFO: task kworker/0:785:5618 blocked for more than 469 seconds. r4:8584b000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb21e08 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8584b000 r7:00000000 r6:83018000 r5:00001000 r4:7f035000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2d3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:848c078c r4:848c0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:848c078c r4:8478b880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8584b000 r8:8478b8ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8478b880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8478b880 r8:80287e08 r7:ec601e60 r6:8478b900 r5:8584b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb21fb0 to 0xebb21ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849b3800 INFO: task kworker/0:785:5618 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: 8e3d5000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:786:5622 blocked for more than 469 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:786 state:D stack:0 pid:5622 tgid:5622 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebaf9d84 r8:00000002 r7:60000113 r6:ebaf9d8c r5:8584d400 r4:8584d400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8584d400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebaf9e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849b3bc0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8584d400 r7:00000000 r6:83018000 r5:00001000 r4:7f037000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb3d1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:848c0b8c r4:848c0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:848c0b8c r4:8478b980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8584d400 r8:8478b9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8478b980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8478b980 r8:80287e08 r7:ebb21e60 r6:8478ba00 r5:8584d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebaf9fb0 to 0xebaf9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849b3800 INFO: task kworker/0:786:5622 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: 8e3d5000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:e05c1dc0 r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: r5:8584e000 r4:8291a680 r4:00000000 r4:00000000 r5:848c138c r4:848c1000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:8584e000 r8:8478baac r7:82804d40 r6:dddced80 r5:dddceda0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84bb2000 Exception stack(0xe05c1fb0 to 0xe05c1ff8) INFO: task kworker/0:788:5625 blocked for more than 469 seconds. r4:8584ec00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb41e08 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:848c0f8c r4:848c0c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:848c0f8c r4:8478bb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8584ec00 r8:8478bbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8478bb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8478bb80 r8:80287e08 r7:ebb35e60 r6:8478bc00 r5:8584ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb41fb0 to 0xebb41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849b3c00 INFO: task kworker/0:788:5625 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: 8ea52000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:789:5627 blocked for more than 469 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:789 state:D stack:0 pid:5627 tgid:5627 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebb31d84 r8:00000002 r7:60000113 r6:ebb31d8c r5:85848000 r4:85848000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85848000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb31e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:848c178c r4:848c1400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:8478bc80 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xe05c1d28 to 0xe05c1d70) [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r5:84be0b8c r4:84be0800 r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:84af0000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb55e08 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:848c1f8c r4:848c1c00 r10:61c88647 r9:84af0000 r8:8478bdac r7:82804d40 r6:dddced80 r5:dddceda0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xe05c1d28 to 0xe05c1d70) [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:791:5631 blocked for more than 470 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:791 state:D stack:0 pid:5631 tgid:5631 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebb65d84 r8:00000002 r7:60000013 r6:ebb65d8c r5:84af1800 r4:84af1800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84af1800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb65e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84baf100 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84af1800 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb745000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:848c1b8c r4:848c1800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:848c1b8c r4:8478be80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84af1800 r8:8478beac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8478be80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8478be80 r8:80287e08 r7:ebb55e60 r6:8478bf00 r5:84af1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb65fb0 to 0xebb65ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84baf080 INFO: task kworker/0:791:5631 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: 8f11d000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:84bb2000 Exception stack(0xe05c1fb0 to 0xe05c1ff8) r4:84ba8980 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:84af2400 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 r5:848c2b8c r4:848c2800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84af2400 r8:8478bfac r7:82804d40 r6:dddced80 r5:dddceda0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) 1d60: 80230ad0 80239bb0 800f0013 ffffffff r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Call trace: r4:85779800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85779800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb8de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84baf580 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85779800 r7:00000000 r6:83018000 r5:00001000 r4:7f043000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb89d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:848c238c r4:848c2000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:848c238c r4:84ba0080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85779800 r8:84ba00ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ba0080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ba0080 r8:80287e08 r7:ebb81e60 r6:857f5e80 r5:85779800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb8dfb0 to 0xebb8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84baf4c0 INFO: task kworker/0:793:5634 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: 8f610000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:794:5636 blocked for more than 470 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:794 state:D stack:0 pid:5636 tgid:5636 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebbb5d84 r8:00000002 r7:60000113 r6:ebbb5d8c r5:85778000 [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:848c278c r4:848c2400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:848c278c r4:84ba0100 r4:84ba0100 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 1d60: 80230ad0 80239bb0 800f0013 ffffffff r4:e05c1dc0 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:848c2f8c r4:848c2c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:8577bc00 r8:84ba01ac r7:82804d40 r6:dddced80 r5:dddceda0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:796:5641 blocked for more than 470 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:796 state:D stack:0 pid:5641 tgid:5641 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebbedd84 r8:00000002 r7:60000113 r6:ebbedd8c r5:8577a400 r4:8577a400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8577a400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbede08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bafc00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8577a400 r7:00000000 r6:83018000 r5:00001000 r4:7f04d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb9cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:848c378c r4:848c3400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:848c378c r4:84ba0200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8577a400 r8:84ba022c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ba0200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ba0200 r8:80287e08 r7:ebbd9e60 r6:84795000 r5:8577a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebbedfb0 to 0xebbedff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84baf780 INFO: task kworker/0:796:5641 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r4:82ac21e4 r4:e05c1dc0 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Call trace: r5:8577c800 r4:8291a680 r4:00000000 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:82ac21e4 r4:00000000 r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:798:5645 blocked for more than 470 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:798 state:D stack:0 pid:5645 tgid:5645 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec625d84 r8:00000002 r7:60000013 r6:ec625d8c r5:8577ec00 r4:8577ec00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8577ec00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec625e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84baf840 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8577ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebad3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8583c38c r4:8583c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8583c38c r4:84ba0300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8577ec00 r8:84ba032c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ba0300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ba0300 r8:80287e08 r7:ebbede60 r6:84795100 r5:8577ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec625fb0 to 0xec625ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84bafa80 INFO: task kworker/0:798:5645 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: 901f1000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:799:5646 blocked for more than 470 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:799 state:D stack:0 pid:5646 tgid:5646 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec629d84 r8:00000002 r7:60000013 r6:ec629d8c r5:8577d400 r4:8577d400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8577d400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:848c3b8c r4:848c3800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:848c3b8c r4:84ba0380 r10:61c88647 r9:8577d400 r8:84ba03ac r7:82804d40 r6:dddced80 r5:dddceda0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r4:82ac21e4 r4:e05c1dc0 r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:848c3f8c r4:848c3c00 r10:61c88647 r9:84af3c00 r8:84ba042c r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r5:00001000 r4:dfd53000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec62dd84 r8:00000002 r7:60000013 r6:ec62dd8c r5:84af4800 r4:84af4800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84af4800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec62de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84916040 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84af4800 r7:00000000 r6:83018000 r5:00001000 r4:7f057000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb05000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8583cb8c r4:8583c800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8583cb8c r4:84ba0500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84af4800 r8:84ba052c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ba0500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ba0500 r8:80287e08 r7:ec625e60 r6:84ba0580 r5:84af4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec62dfb0 to 0xec62dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8479cec0 INFO: task kworker/0:801:5651 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: 903be000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:802:5652 blocked for more than 470 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:802 state:D stack:0 pid:5652 tgid:5652 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec635d84 r8:00000002 r7:60000013 r6:ec635d8c r5:84af5400 r4:84af5400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84af5400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec635e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8479cf80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84af5400 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebae7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8583c78c r4:8583c400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8583c78c r4:84ba0600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84af5400 r8:84ba062c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ba0600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ba0600 r8:80287e08 r7:ec62de60 r6:84ba0680 r5:84af5400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec635fb0 to 0xec635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84baffc0 INFO: task kworker/0:802:5652 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: 903be000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 Exception stack(0xe05c1fb0 to 0xe05c1ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred r4:84af6000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec639e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84916280 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84af6000 r7:00000000 r6:83018000 r5:00001000 r4:7f059000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8583cf8c r4:8583cc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8583cf8c r4:84ba0700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84af6000 r8:84ba072c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ba0700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ba0700 r8:80287e08 r7:ec62de60 r6:84ba0780 r5:84af6000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec639fb0 to 0xec639ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849161c0 INFO: task kworker/0:803:5655 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: 9065e000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec63de08 r5:00001000 r4:ebb4d000 r5:8583d38c r4:8583d000 r7:dddced80 r6:83018000 r5:8583d38c r4:84ba0800 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r5:800f0013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:84af3000 r7:00000000 r6:83018000 r5:00001000 r4:7f061000 r5:8583df8c r4:8583dc00 r7:dddced80 r6:83018000 r5:8583df8c r4:84ba0900 r4:00000001 Exception stack(0xec641fb0 to 0xec641ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84916100 INFO: task kworker/0:805:5659 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: 90bd6000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:806:5661 blocked for more than 470 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:806 state:D stack:0 pid:5661 tgid:5661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec645d84 r8:00000002 r7:60000113 r6:ec645d8c r5:84af0c00 r4:84af0c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84af0c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec645e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84916640 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8583d78c r4:8583d400 r7:dddced80 r6:83018000 r5:8583d78c r4:84ba0a00 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:800f0013 r4:80239bb0 r4:e05c1dc0 r5:00001000 r4:dfd53000 r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:807:5662 blocked for more than 470 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:807 state:D stack:0 pid:5662 tgid:5662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec64dd84 r8:00000002 r7:60000113 r6:ec64dd8c r5:8577b000 r4:8577b000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8577b000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec64de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84916780 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8577b000 r7:00000000 r6:83018000 r5:00001000 r4:7f05f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb7d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8583db8c r4:8583d800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8583db8c r4:84ba0b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8577b000 r8:84ba0b2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ba0b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ba0b00 r8:80287e08 r7:ec641e60 r6:84795200 r5:8577b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec64dfb0 to 0xec64dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849162c0 INFO: task kworker/0:807:5662 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: 910c1000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 r4:84bb2000 r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:dfa8f000 r5:84bd478c r4:84bd4400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xec661fb0 to 0xec661ff8) task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 1d60: 80230ad0 80239bb0 800f0013 ffffffff r4:e05c1dc0 r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:809:5666 blocked for more than 470 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:809 state:D stack:0 pid:5666 tgid:5666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec665d84 r8:00000002 r7:60000113 r6:ec665d8c r5:8577e000 r4:8577e000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8577e000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec665e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84916a40 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8577e000 r7:00000000 r6:83018000 r5:00001000 r4:7f09f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebbb1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8583e38c r4:8583e000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8583e38c r4:84ba0c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8577e000 r8:84ba0c2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ba0c00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ba0c00 r8:80287e08 r7:ec661e60 r6:84795300 r5:8577e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec665fb0 to 0xec665ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84916740 INFO: task kworker/0:809:5666 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: 91546000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec681e08 r9:83018005 r8:85778c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a1000 r5:8583e78c r4:8583e400 r10:61c88647 r9:85778c00 r8:84ba0cac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ba0c80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ba0c80 r8:80287e08 r7:ec661e60 r6:84795380 r5:85778c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec681fb0 to 0xec681ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84916900 INFO: task kworker/0:810:5668 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: 91546000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:8291a684 r9:ec689d84 r8:00000002 r7:60000113 r6:ec689d8c r5:85780c00 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:8583eb8c r4:8583e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85780c00 r8:84ba0d2c r7:82804d40 r6:dddced80 r5:dddceda0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r5:800f0013 r4:80239bb0 r4:e05c1dc0 r5:00001000 r4:dfd53000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:812 state:D stack:0 pid:5672 tgid:5672 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r4:00000000 r5:00001000 r4:ec64f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8583ef8c r4:8583ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8583ef8c r4:84ba0d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85780000 r8:84ba0dac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ba0d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ba0d80 r8:80287e08 r7:ec661e60 r6:84795480 r5:85780000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec691fb0 to 0xec691ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84916b80 INFO: task kworker/0:812:5672 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: 91dfa000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:813:5674 blocked for more than 470 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:813 state:D stack:0 pid:5674 tgid:5674 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec6a5d84 r8:00000002 r7:60000013 r6:ec6a5d8c r5:85781800 r4:85781800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85781800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec6a5e08 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:8583f38c r4:8583f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:84916e40 r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r5:800f0013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:814:5676 blocked for more than 470 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:814 state:D stack:0 pid:5676 tgid:5676 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r4:85782400 [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ec6a1000 r5:8583f78c r4:8583f400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8583f78c r4:84ba0e80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85782400 r8:84ba0eac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ba0e80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ba0e80 r8:80287e08 r7:ec661e60 r6:84795580 r5:85782400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec6b5fb0 to 0xec6b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84916c80 INFO: task kworker/0:814:5676 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:82ac21e4 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:85784800 r7:00000000 r6:83018000 r5:00001000 r4:7f0b7000 r5:8583fb8c r4:8583f800 r10:61c88647 r9:85784800 r8:84ba0f2c r7:82804d40 r6:dddced80 r5:dddceda0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: 920f8000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:816:5680 blocked for more than 470 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:816 state:D stack:0 pid:5680 tgid:5680 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec649d84 r8:00000002 r7:60000113 r6:ec649d8c r5:84b80000 r4:84b80000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b80000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec649e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8481e280 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84b80000 r7:00000000 r6:83018000 r5:00001000 r4:7f0b9000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec6c1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8583ff8c r4:8583fc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8583ff8c r4:84ba0f80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b80000 r8:84ba0fac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ba0f80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ba0f80 r8:80287e08 r7:ec661e60 r6:84821000 r5:84b80000 r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 1d60: 80230ad0 80239bb0 800f0013 ffffffff r4:e05c1dc0 r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r4:00000000 r4:00000000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:84bd438c r4:84821080 r10:00000000 r9:84821080 r8:80287e08 r7:ec661e60 r6:84821100 r5:84b80c00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8481e340 INFO: task kworker/0:817:5682 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: 9288a000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:457:5689 blocked for more than 470 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:457 state:D stack:0 pid:5689 tgid:5689 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebaa9d84 r8:00000002 r7:60000013 r6:ebaa9d8c r5:84b81800 r4:84b81800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b81800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 r4:00000000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8471d78c r4:8471d400 r7:ddde2d80 r6:83018200 r5:8471d78c r4:84795680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 r5:800f0013 r4:80239bb0 r4:e05c1dc0 r5:00001000 r4:dfd53000 r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:84b83000 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 r5:8471d38c r4:8471d000 r10:61c88647 r9:84b83000 r8:8479572c r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe05c1d28 to 0xe05c1d70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8481e680 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84b83c00 r7:00000000 r6:83018000 r5:00001000 r4:7f063000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff21000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84bd4b8c r4:84bd4800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84bd4b8c r4:84821280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b83c00 r8:848212ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84821280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84821280 r8:80287e08 r7:ec661e60 r6:84821300 r5:84b83c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc2dfb0 to 0xebc2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8481e7c0 INFO: task kworker/0:818:5691 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: 92b33000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:84be0b8c r4:84be0800 r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8291a684 r9:ebaa5d84 r8:00000002 r7:60000113 r6:ebaa5d8c r5:85786000 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:84bd538c r4:84bd5000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8481e7c0 INFO: task kworker/0:819:5693 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: 93055000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:820:5694 blocked for more than 470 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:820 state:D stack:0 pid:5694 tgid:5694 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebc35d84 r8:00000002 r7:60000113 r6:ebc35d8c r5:84b84800 r4:84b84800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b84800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc35e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r4:00000000 r5:84bd4f8c r4:84bd4c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84bd4f8c r4:84821400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:8481e7c0 r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r5:800f0013 r4:80239bb0 r4:e05c1dc0 r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebbc1d84 r8:00000002 r7:60000013 r6:ebbc1d8c r5:85783c00 r4:85783c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85783c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbc1e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847cb8c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85783c00 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4cd000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8471cf8c r4:8471cc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8471cf8c r4:84795800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85783c00 r8:8479582c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84795800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84795800 r8:80287e08 r7:ebab5e60 r6:84795880 r5:85783c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebbc1fb0 to 0xebbc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847cb600 INFO: task kworker/1:459:5695 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: 93055000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r5:84be0b8c r4:84be0800 r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:85785400 r4:8291a680 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858b038c r4:858b0000 r10:61c88647 r9:85785400 r8:8479592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 1d20: 933e7000 dfb47000 00000001 80239b98 7f2fb000 00000001 r4:e05c1dc0 r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fa0: 00000000 00000000 00000000 00000000 task:kworker/1:461 state:D stack:0 pid:5699 tgid:5699 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8291a684 r9:ec6e9d84 r8:00000002 r7:60000113 r6:ec6e9d8c r5:84b85400 r4:84b85400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b85400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec6e9e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847cbc80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b85400 r7:00000000 r6:83018200 r5:00001000 r4:7f073000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb57d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858b078c r4:858b0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858b078c r4:84795a00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b85400 r8:84795a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84795a00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84795a00 r8:80287e08 r7:ebce9e60 r6:84821500 r5:84b85400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec6e9fb0 to 0xec6e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847cb900 INFO: task kworker/1:461:5699 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: 933e7000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:84ba8980 task:kworker/1:462 state:D stack:0 pid:5702 tgid:5702 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:858b1f8c r4:858b1c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858b1f8c r4:84795a80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b86000 r8:84795aac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84795a80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84795a80 r8:80287e08 r7:ec6e9e60 r6:84821580 r5:84b86000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec6edfb0 to 0xec6edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847cbb00 INFO: task kworker/1:462:5702 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: 93827000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xe05c1fb0 to 0xe05c1ff8) INFO: task kworker/1:463:5703 blocked for more than 470 seconds. [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847cbdc0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b86c00 r7:00000000 r6:83018200 r5:00001000 r4:7f075000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb69f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858b0b8c r4:858b0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858b0b8c r4:84795b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b86c00 r8:84795b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84795b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84795b00 r8:80287e08 r7:ec6ede60 r6:84821600 r5:84b86c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec6f1fb0 to 0xec6f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847cb980 INFO: task kworker/1:463:5703 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r4:00000000 1d60: 80230ad0 80239bb0 800f0013 ffffffff r4:e05c1dc0 r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:84b82400 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 r5:84bd5f8c r4:84bd5c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xec6e5fb0 to 0xec6e5ff8) task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 1d60: 80230ad0 80239bb0 800f0013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:464:5708 blocked for more than 470 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:464 state:D stack:0 pid:5708 tgid:5708 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec6f5d84 r8:00000002 r7:60000013 r6:ec6f5d8c r5:85770000 r4:85770000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85770000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec6f5e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847cbf00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85770000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb82d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858b0f8c r4:858b0c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858b0f8c r4:84795b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85770000 r8:84795bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84795b80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84795b80 r8:80287e08 r7:ec6ede60 r6:84795c00 r5:85770000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec6f5fb0 to 0xec6f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847cbd80 INFO: task kworker/1:464:5708 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred 1d20: 93c59000 dfb47000 00000001 80239b98 7f2fb000 00000001 r4:e05c1dc0 r5:00001000 r4:dfd53000 r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb865000 r5:858b138c r4:858b1000 r10:61c88647 r9:85783000 r8:84795cac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:466:5711 blocked for more than 470 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:466 state:D stack:0 pid:5711 tgid:5711 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebcf5d84 r8:00000002 r7:60000113 r6:ebcf5d8c r5:847f0c00 r4:847f0c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:847f0c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebcf5e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847f8040 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:847f0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8a5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858b178c r4:858b1400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858b178c r4:84795d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:847f0c00 r8:84795dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84795d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84795d80 r8:80287e08 r7:ec6ede60 r6:84795e00 r5:847f0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r5:84be0b8c r4:84be0800 r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 INFO: task kworker/1:467:5713 blocked for more than 470 seconds. [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r4:00000000 r5:858b1b8c r4:858b1800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:847f8240 INFO: task kworker/1:467:5713 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: 94167000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847f8440 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:847f2400 r7:00000000 r6:83018200 r5:00001000 r4:7f083000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba67000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858b238c r4:858b2000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858b238c r4:84795f80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:847f2400 r8:84795fac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84795f80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84795f80 r8:80287e08 r7:ec6ede60 r6:8480a000 r5:847f2400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec701fb0 to 0xec701ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847f8340 INFO: task kworker/1:468:5716 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d60: 80230ad0 80239bb0 800f0013 ffffffff r4:00000000 r5:84be0b8c r4:84be0800 r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:84ba8980 task:kworker/1:469 state:D stack:0 pid:5719 tgid:5719 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r4:00000000 r5:858b2f8c r4:858b2c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:e05c1dc0 r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:84ba8980 task:kworker/1:470 state:D stack:0 pid:5720 tgid:5720 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847f8740 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:847f3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f085000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba89000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858b278c r4:858b2400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858b278c r4:8480a180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:847f3c00 r8:8480a1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8480a180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8480a180 r8:80287e08 r7:ec705e60 r6:8480a200 r5:847f3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec70dfb0 to 0xec70dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847f8540 INFO: task kworker/1:470:5720 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: 9478a000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:471:5721 blocked for more than 470 seconds. r10:8291a684 r9:ec711d84 r8:00000002 r7:60000113 r6:ec711d8c r5:847f4800 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:858b2b8c r4:858b2800 r7:ddde2d80 r6:83018200 r5:858b2b8c r4:8480a280 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 1d60: 80230ad0 80239bb0 800f0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:472:5724 blocked for more than 470 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:472 state:D stack:0 pid:5724 tgid:5724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec715d84 r8:00000002 r7:60000113 r6:ec715d8c r5:847f5400 r4:847f5400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:847f5400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec715e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847f8c00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:847f5400 r7:00000000 r6:83018200 r5:00001000 r4:7f08b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc1d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858b338c r4:858b3000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858b338c r4:8480a380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:847f5400 r8:8480a3ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8480a380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8480a380 r8:80287e08 r7:ec705e60 r6:8480a400 r5:847f5400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec715fb0 to 0xec715ff8) 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 1d20: 94bc7000 dfb47000 00000001 80239b98 7f2fb000 00000001 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r4:84ba8980 task:kworker/1:473 state:D stack:0 pid:5726 tgid:5726 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:847f6000 r7:00000000 r6:83018200 r5:00001000 r4:7f091000 r5:858b3f8c r4:858b3c00 r10:61c88647 r9:847f6000 r8:8480a4ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:847f6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f08d000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858b378c r4:858b3400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858b378c r4:8480a580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:847f6c00 r8:8480a5ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8480a580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8480a580 r8:80287e08 r7:ec721e60 r6:8480a600 r5:847f6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec725fb0 to 0xec725ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847f8cc0 INFO: task kworker/1:474:5728 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: 952f6000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:475:5729 blocked for more than 471 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:475 state:D stack:0 pid:5729 tgid:5729 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec729d84 r8:00000002 r7:60000113 r6:ec729d8c r5:847f0000 r4:847f0000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:847f0000 r4:8291a680 [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:847f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 r5:858b3b8c r4:858b3800 r10:61c88647 r9:847f0000 r8:8480a6ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 1d60: 80230ad0 80239bb0 800f0013 ffffffff r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xe05c1fb0 to 0xe05c1ff8) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:85786c00 r4:8291a680 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:858bc38c r4:858bc000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:847f8f80 r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:477:5733 blocked for more than 471 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:477 state:D stack:0 pid:5733 tgid:5733 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec73dd84 r8:00000002 r7:60000113 r6:ec73dd8c r5:847d8000 r4:847d8000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:847d8000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec73de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:843e52c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:847d8000 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebcc5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858bc78c r4:858bc400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858bc78c r4:8480a880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:847d8000 r8:8480a8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8480a880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8480a880 r8:80287e08 r7:ec719e60 r6:8480a900 r5:847d8000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:847f8f80 Workqueue: events bpf_prog_free_deferred 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:858bcb8c r4:858bc800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xec74dfb0 to 0xec74dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:843e5140 INFO: task kworker/1:478:5736 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: 9595c000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:847da400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 r5:858bd38c r4:858bd000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:843e51c0 r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r5:800f0013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:8291a684 r9:ec775d84 r8:00000002 r7:60000013 r6:ec775d8c r5:847d8c00 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:843e5980 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:847d8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f09d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec519000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858bcf8c r4:858bcc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858bcf8c r4:8480ab80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:847d8c00 r8:8480abac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8480ab80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8480ab80 r8:80287e08 r7:ec751e60 r6:8480ac00 r5:847d8c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec775fb0 to 0xec775ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:843e5300 INFO: task kworker/1:480:5741 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: 95f27000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:8291a684 r9:ec779d84 r8:00000002 r7:60000013 r6:ec779d8c r5:847dc800 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:84bd578c r4:84bd5400 r7:dddced80 r6:83018000 r5:84bd578c r4:84821780 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 1d60: 80230ad0 80239bb0 800f0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:847db000 r8:8480ad2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8480ad00 r8:80287e08 r7:ec751e60 r6:8480ad80 r5:847db000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec771fb0 to 0xec771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:843e5480 INFO: task kworker/1:481:5745 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: 9648f000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:482:5747 blocked for more than 471 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:482 state:D stack:0 pid:5747 tgid:5747 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec755d84 r8:00000002 r7:60000113 r6:ec755d8c r5:847dd400 r4:847dd400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:847dd400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec755e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:843e5580 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:847dd400 r7:00000000 r6:83018200 r5:00001000 r4:7f0ad000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec573000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858be38c r4:858be000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858be38c r4:8480ae00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:847dd400 r8:8480ae2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8480ae00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8480ae00 r8:80287e08 r7:ec771e60 r6:8480ae80 r5:847dd400 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849b67c0 INFO: task kworker/0:823:5748 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: 96796000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:483:5749 blocked for more than 471 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:483 state:D stack:0 pid:5749 tgid:5749 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec77dd84 r8:00000002 r7:60000113 r6:ec77dd8c r5:847dec00 r4:847dec00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:847dec00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec77de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:843e5cc0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:847dec00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a9000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec54d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xec77dfb0 to 0xec77dff8) task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:800f0013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ec55f000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858bdf8c r4:858bdc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858bdf8c r4:84ba5080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:847dbc00 r8:84ba50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84ba5080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ba5080 r8:80287e08 r7:ec755e60 r6:84ba5100 r5:847dbc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec781fb0 to 0xec781ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:843e5d40 INFO: task kworker/1:484:5752 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: 96b58000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/1:485:5754 blocked for more than 471 seconds. r5:858e8000 r4:8291a680 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858be78c r4:858be400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 1d20: 96e21000 dfb47000 00000001 80239b98 7f2fb000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ec58f000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:84ba5280 r8:80287e08 r7:ec785e60 r6:84ba5300 r5:858e8c00 task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:487:5758 blocked for more than 471 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:487 state:D stack:0 pid:5758 tgid:5758 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec78dd84 r8:00000002 r7:60000013 r6:ec78dd8c r5:858e9800 r4:858e9800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:858e9800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec78de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba4480 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:858e9800 r7:00000000 r6:83018200 r5:00001000 r4:7f0bf000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec5a3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858bef8c r4:858bec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858bef8c r4:84ba5380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:858e9800 r8:84ba53ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84ba5380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ba5380 r8:80287e08 r7:ec789e60 r6:84ba5400 r5:858e9800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec78dfb0 to 0xec78dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba4080 INFO: task kworker/1:487:5758 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: 9752d000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xe05c1fb0 to 0xe05c1ff8) INFO: task kworker/1:488:5760 blocked for more than 471 seconds. r4:858eb000 [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ec5cf000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xe05c1d28 to 0xe05c1d70) r4:82ac21e4 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) 1fa0: 00000000 00000000 00000000 00000000 task:kworker/1:489 state:D stack:0 pid:5761 tgid:5761 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba48c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:858ebc00 r7:00000000 r6:83018200 r5:00001000 r4:7f0c3000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec5bb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858bf38c r4:858bf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858bf38c r4:84ba5580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:858ebc00 r8:84ba55ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84ba5580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ba5580 r8:80287e08 r7:ec795e60 r6:84ba5600 r5:858ebc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec799fb0 to 0xec799ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba4340 INFO: task kworker/1:489:5761 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: 9752d000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eaf5f000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:858ea400 r8:848218ac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 1d60: 80230ad0 80239bb0 800f0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:490 state:D stack:0 pid:5769 tgid:5769 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:858ed400 r8:84ba572c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba4800 INFO: task kworker/1:490:5769 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: 97c08000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:491:5770 blocked for more than 471 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:491 state:D stack:0 pid:5770 tgid:5770 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec659d84 r8:00000002 r7:60000113 r6:ec659d8c r5:858ee000 r4:858ee000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:858ee000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec659e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba4ac0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:858ee000 r7:00000000 r6:83018200 r5:00001000 r4:7f015000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfaef000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858bfb8c r4:858bf800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858bfb8c r4:84ba5800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:858ee000 r8:84ba582c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84ba5800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ba5800 r8:80287e08 r7:ec791e60 r6:84ba5880 r5:858ee000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec659fb0 to 0xec659ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r5:00001000 r4:dfd53000 r4:84bb2000 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-rc7-syzkaller #0 r4:858eec00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec699e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84440d00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:858eec00 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb5b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858bff8c r4:858bfc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858bff8c r4:84ba5900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:858eec00 r8:84ba592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84ba5900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ba5900 r8:80287e08 r7:ec791e60 r6:84ba5980 r5:858eec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec699fb0 to 0xec699ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba4800 INFO: task kworker/1:492:5771 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: 97c08000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:825:5773 blocked for more than 471 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:825 state:D stack:0 pid:5773 tgid:5773 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r5:84be0b8c r4:84be0800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r4:858f0000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:858f0000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec6b9e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b7f040 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:858f0000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb259000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84bd6b8c r4:84bd6800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84bd6b8c r4:84821980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:858f0000 r8:848219ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84821980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84821980 r8:80287e08 r7:ec6a9e60 r6:84ba5a80 r5:858f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec6b9fb0 to 0xec6b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849b6540 INFO: task kworker/0:826:5775 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: 982cc000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r5:84be0b8c r4:84be0800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:84ba8980 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:84821a00 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:82ac21e4 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 INFO: task kworker/0:828:5779 blocked for more than 471 seconds. [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec7a9e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b7f440 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:858f2400 r7:00000000 r6:83018000 r5:00001000 r4:7f035000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5cf000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84bd738c r4:84bd7000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84bd738c r4:84821a80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:858f2400 r8:84821aac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84821a80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84821a80 r8:80287e08 r7:ec6dde60 r6:84ba5b80 r5:858f2400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec7a9fb0 to 0xec7a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b7f1c0 INFO: task kworker/0:828:5779 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: 98492000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:84ba8980 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb903000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:84821b00 Exception stack(0xec7b1fb0 to 0xec7b1ff8) r4:84b7f240 r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:82ac21e4 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:830:5782 blocked for more than 471 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:830 state:D stack:0 pid:5782 tgid:5782 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec7b5d84 r8:00000002 r7:60000013 r6:ec7b5d8c r5:858f1800 r4:858f1800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:858f1800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec7b5e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b7f600 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:858f1800 r7:00000000 r6:83018000 r5:00001000 r4:7f037000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb65b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84bd778c r4:84bd7400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84bd778c r4:84821b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:858f1800 r8:84821bac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84821b80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84821b80 r8:80287e08 r7:ec7b1e60 r6:84ba5c80 r5:858f1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec7b5fb0 to 0xec7b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b7f240 INFO: task kworker/0:830:5782 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: 98849000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fa0: 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:831 state:D stack:0 pid:5785 tgid:5785 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec7c1d84 r8:00000002 r7:60000113 r6:ec7c1d8c r5:858f6000 r4:858f6000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:858f6000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec7c1e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b7f700 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:858f6000 r7:00000000 r6:83018000 r5:00001000 r4:7f039000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb723000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84bd7b8c r4:84bd7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84bd7b8c r4:84821c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 1d60: 80230ad0 80239bb0 800f0013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xe05c1fb0 to 0xe05c1ff8) r4:84ba8980 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:84821c80 Exception stack(0xec7c5fb0 to 0xec7c5ff8) task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: 98c3e000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:833:5788 blocked for more than 471 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:833 state:D stack:0 pid:5788 tgid:5788 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebb75d84 r8:00000002 r7:60000013 r6:ebb75d8c r5:84b3a400 r4:84b3a400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b3a400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb75e08 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8587cb8c r4:8587c800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:84821d00 r8:80287e08 r7:ec7b1e60 r6:84821d80 r5:84b3a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb75fb0 to 0xebb75ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b7f6c0 INFO: task kworker/0:833:5788 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: 98c3e000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r5:00001000 r4:dfd53000 r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b7fb40 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84b3b000 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb923000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8587c78c r4:8587c400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8587c78c r4:84821e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b3b000 r8:84821e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84821e00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84821e00 r8:80287e08 r7:ebb75e60 r6:84821e80 r5:84b3b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec61dfb0 to 0xec61dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:84821f00 Exception stack(0xec7c9fb0 to 0xec7c9ff8) r4:84b7fb80 r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r5:00001000 r4:dfd53000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:836:5795 blocked for more than 471 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:836 state:D stack:0 pid:5795 tgid:5795 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec7d5d84 r8:00000002 r7:60000013 r6:ec7d5d8c r5:84b3c800 r4:84b3c800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b3c800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec7d5e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b7fd80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84b3c800 r7:00000000 r6:83018000 r5:00001000 r4:7f043000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb9b9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8587cf8c r4:8587cc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8587cf8c r4:84bdd000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b3c800 r8:84bdd02c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84bdd000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdd000 r8:80287e08 r7:ec7c9e60 r6:84bdd080 r5:84b3c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec7d5fb0 to 0xec7d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b7fb80 INFO: task kworker/0:836:5795 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: 9952b000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r5:84b3d400 r4:8291a680 r4:00000000 r4:00000000 r5:00001000 r4:ebabd000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:838:5799 blocked for more than 471 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:838 state:D stack:0 pid:5799 tgid:5799 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec7cdd84 r8:00000002 r7:60000113 r6:ec7cdd8c r5:84b3ec00 r4:84b3ec00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b3ec00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec7cde08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849b6fc0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84b3ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebadb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8587db8c r4:8587d800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8587db8c r4:84bdd200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b3ec00 r8:84bdd22c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84bdd200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdd200 r8:80287e08 r7:ec7d9e60 r6:84bdd280 r5:84b3ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec7cdfb0 to 0xec7cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba4f40 INFO: task kworker/0:838:5799 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: 99746000 dfb47000 00000001 80239b98 7f2fb000 00000001 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r5:00001000 r4:dfd53000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:84ba8980 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ebafd000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: 99746000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:840:5803 blocked for more than 471 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:840 state:D stack:0 pid:5803 tgid:5803 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec7e5d84 r8:00000002 r7:60000013 r6:ec7e5d8c r5:858f3000 r4:858f3000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:858f3000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec7e5e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bcb580 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:858f3000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 r5:00001000 r4:ebb71000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 1d20: 999e5000 dfb47000 00000001 80239b98 7f2fb000 00000001 r4:e05c1dc0 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 INFO: task kworker/0:841:5805 blocked for more than 471 seconds. [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec7ddd84 r8:00000002 r7:60000013 r6:ec7ddd8c r5:858f6c00 r4:858f6c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:858f6c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec7dde08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bcb340 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:858f6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f04d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb2d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8587e38c r4:8587e000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8587e38c r4:84bdd400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:858f6c00 r8:84bdd42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84bdd400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdd400 r8:80287e08 r7:ec7e5e60 r6:84ba5f00 r5:858f6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec7ddfb0 to 0xec7ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84bcb1c0 INFO: task kworker/0:841:5805 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: 999e5000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/0:842:5808 blocked for more than 471 seconds. r5:858f8000 r4:8291a680 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: 9a251000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:843:5809 blocked for more than 471 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:843 state:D stack:0 pid:5809 tgid:5809 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:858f8c00 r4:8291a680 r4:00000000 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8587eb8c r4:8587e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:84bdd500 r8:80287e08 r7:ec7ede60 r6:849b7000 r5:858f8c00 r4:84bcb5c0 r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r5:00001000 r4:dfd53000 r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec7f5e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bcb9c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:858f9800 r7:00000000 r6:83018000 r5:00001000 r4:7f059000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec5e7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8587f38c r4:8587f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8587f38c r4:84bdd580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:858f9800 r8:84bdd5ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84bdd580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdd580 r8:80287e08 r7:ec7ede60 r6:849b7080 r5:858f9800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec7f5fb0 to 0xec7f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84bcb5c0 INFO: task kworker/0:844:5811 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: 9a62a000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/1:493:5814 blocked for more than 471 seconds. r5:858fa400 r4:8291a680 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844401c0 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:858fa400 r8:849b712c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: 1d20: 9a62a000 dfb47000 00000001 80239b98 7f2fb000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r5:84be0b8c r4:84be0800 r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8587f78c r4:8587f400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8587f78c r4:84bdd600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:858fb000 r8:84bdd62c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84bdd600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdd600 r8:80287e08 r7:ec7f5e60 r6:849b7200 r5:858fb000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec7fdfb0 to 0xec7fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84bcb900 INFO: task kworker/0:845:5815 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: 9aaad000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:494:5818 blocked for more than 471 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:494 state:D stack:0 pid:5818 tgid:5818 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec7f9d84 r8:00000002 r7:60000113 r6:ec7f9d8c r5:858fbc00 [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:858fbc00 r8:849b72ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:82ac21e4 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec805d84 r8:00000002 r7:60000013 r6:ec805d8c r5:858fc800 r4:858fc800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:858fc800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec805e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bcbe00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:858fc800 r7:00000000 r6:83018000 r5:00001000 r4:7f061000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec65b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8587fb8c r4:8587f800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8587fb8c r4:84bdd680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:858fc800 r8:84bdd6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84bdd680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdd680 r8:80287e08 r7:ec7fde60 r6:849b7380 r5:858fc800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec805fb0 to 0xec805ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84bcba80 INFO: task kworker/0:846:5819 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: 9b3b0000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 1fa0: 00000000 00000000 00000000 00000000 r4:84ba8980 INFO: task kworker/1:495:5821 blocked for more than 471 seconds. Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec801d84 r8:00000002 r7:60000113 r6:ec801d8c r5:858fd400 r4:858fd400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:858fd400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec801e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbd4c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:858fd400 r7:00000000 r6:83018200 r5:00001000 r4:7f073000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7cd000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858d1f8c r4:858d1c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858d1f8c r4:849b7400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:858fd400 r8:849b742c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849b7400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849b7400 r8:80287e08 r7:ec7f9e60 r6:849b7480 r5:858fd400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec801fb0 to 0xec801ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84bbd080 INFO: task kworker/1:495:5821 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: 9b3b0000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:8291a684 r9:ec80dd84 r8:00000002 r7:60000013 r6:ec80dd8c r5:858fe000 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbdb40 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:858fe000 r7:00000000 r6:83018200 r5:00001000 r4:7f067000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eacf7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858d138c r4:858d1000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858d138c r4:849b7500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:858fe000 r8:849b752c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849b7500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849b7500 r8:80287e08 r7:ec801e60 r6:849b7580 r5:858fe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec80dfb0 to 0xec80dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84bbd080 INFO: task kworker/1:496:5823 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: 9b3b0000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:847:5825 blocked for more than 471 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:847 state:D stack:0 pid:5825 tgid:5825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec811d84 r8:00000002 r7:60000113 r6:ec811d8c r5:858fec00 r4:858fec00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:858fec00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec811e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bcbf40 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:858fec00 r7:00000000 r6:83018000 r5:00001000 r4:7f09f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec67d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8587ff8c r4:8587fc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8587ff8c r4:84bdd700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:858fec00 r8:84bdd72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84bdd700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdd700 r8:80287e08 r7:ec805e60 r6:849b7600 r5:858fec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec811fb0 to 0xec811ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84bcbc80 INFO: task kworker/0:847:5825 is blocked on a mutex likely owned by task kworker/1:204:3660. Workqueue: events bpf_prog_free_deferred 1d20: 9b935000 dfb47000 00000001 80239b98 7f2fb000 00000001 r4:e05c1dc0 r5:00001000 r4:dfd53000 r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 Exception stack(0xe05c1fb0 to 0xe05c1ff8) INFO: task kworker/0:848:5827 blocked for more than 471 seconds. r10:8291a684 r9:ec819d84 r8:00000002 r7:60000113 r6:ec819d8c r5:85900c00 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bcb940 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85900c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a1000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec68d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8588438c r4:85884000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8588438c r4:84bdd780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85900c00 r8:84bdd7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84bdd780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdd780 r8:80287e08 r7:ec811e60 r6:849b7680 r5:85900c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec819fb0 to 0xec819ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84bcbdc0 INFO: task kworker/0:848:5827 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:82ac21e4 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:849:5831 blocked for more than 471 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:849 state:D stack:0 pid:5831 tgid:5831 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec6d1d84 r8:00000002 r7:60000113 r6:ec6d1d8c r5:85901800 r4:85901800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85901800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec6d1e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bcbb80 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8588478c r4:85884400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 r4:84bcbfc0 r4:00000000 1d60: 80230ad0 80239bb0 800f0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:850:5833 blocked for more than 471 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:850 state:D stack:0 pid:5833 tgid:5833 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec821d84 r8:00000002 r7:60000113 r6:ec821d8c r5:85902400 r4:85902400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85902400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec821e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8481e2c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85902400 r7:00000000 r6:83018000 r5:00001000 r4:7f065000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e050b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85884b8c r4:85884800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85884b8c r4:84bdd880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85902400 r8:84bdd8ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84bdd880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdd880 r8:80287e08 r7:ec6d1e60 r6:84bdd900 r5:85902400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec821fb0 to 0xec821ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84bcbfc0 INFO: task kworker/0:850:5833 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r5:00001000 r4:dfd53000 r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: 1d20: 9bd4c000 dfb47000 00000001 80239b98 7f2fb000 00000001 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r5:84be0b8c r4:84be0800 r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 INFO: task kworker/1:497:5837 blocked for more than 471 seconds. Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec6cdd84 r8:00000002 r7:60000013 r6:ec6cdd8c r5:84b38c00 r4:84b38c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b38c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec6cde08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbda40 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b38c00 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb477000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858d178c r4:858d1400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858d178c r4:849b7780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b38c00 r8:849b77ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849b7780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849b7780 r8:80287e08 r7:ec801e60 r6:84bdda80 r5:84b38c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec6cdfb0 to 0xec6cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84bbdac0 INFO: task kworker/1:497:5837 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: 9c40c000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xe05c1d28 to 0xe05c1d70) r4:82ac21e4 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:853:5840 blocked for more than 471 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:853 state:D stack:0 pid:5840 tgid:5840 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec825d84 r8:00000002 r7:60000113 r6:ec825d8c r5:84b3e000 r4:84b3e000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b3e000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec825e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8583b040 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84b3e000 r7:00000000 r6:83018000 r5:00001000 r4:7f091000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85885b8c r4:85885800 r7:dddced80 r6:83018000 r5:85885b8c r4:84bddc00 r10:00000000 r9:84bddc00 r8:80287e08 r7:ec815e60 r6:84bddc80 r5:84b3e000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:843e4280 INFO: task kworker/0:853:5840 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: 9c40c000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:8291a684 r9:ec829d84 r8:00000002 r7:60000113 r6:ec829d8c r5:85028000 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:eb545000 r5:8588578c r4:85885400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:84bddd00 9fa0: 00000000 00000000 00000000 00000000 Call trace: 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:858d1b8c r4:858d1800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85028c00 r8:849b782c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: 9cc83000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/1:499:5847 blocked for more than 471 seconds. r4:8502b000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec83de08 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:858d238c r4:858d2000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:8502b000 r8:849b78ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) 1d60: 80230ad0 80239bb0 800f0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 Exception stack(0xe05c1fb0 to 0xe05c1ff8) r4:84ba8980 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:858d2f8c r4:858d2c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85029800 r8:849b792c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849b7900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849b7900 r8:80287e08 r7:ec83de60 r6:84bddf00 r5:85029800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec845fb0 to 0xec845ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84bbdf80 INFO: task kworker/1:500:5849 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: 9cc83000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:501:5850 blocked for more than 471 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:501 state:D stack:0 pid:5850 tgid:5850 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec82dd84 r8:00000002 r7:60000013 r6:ec82dd8c r5:85900000 r4:85900000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85900000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec82de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r9:83018205 r8:85900000 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 r5:858d278c r4:858d2400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:849b7980 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xe05c1d28 to 0xe05c1d70) r4:82ac21e4 r4:00000000 r5:84be0b8c r4:84be0800 r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:502:5852 blocked for more than 471 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:502 state:D stack:0 pid:5852 tgid:5852 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec849d84 r8:00000002 r7:60000113 r6:ec849d8c r5:85903c00 r4:85903c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85903c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec849e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849f4040 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85903c00 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba1f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858d2b8c r4:858d2800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858d2b8c r4:849b7a80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85903c00 r8:849b7aac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849b7a80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849b7a80 r8:80287e08 r7:ec845e60 r6:849b7b00 r5:85903c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec849fb0 to 0xec849ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849f4000 INFO: task kworker/1:502:5852 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: 9d309000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:84be0b8c r4:84be0800 r4:84bb2000 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: r5:85904800 r4:8291a680 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:858d338c r4:858d3000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85904800 r8:849b7bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849b7b80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849b7b80 r8:80287e08 r7:ec845e60 r6:849b7c00 r5:85904800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec84dfb0 to 0xec84dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849f4180 INFO: task kworker/1:503:5855 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: 9d710000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:504:5857 blocked for more than 472 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:504 state:D stack:0 pid:5857 tgid:5857 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec851d84 r8:00000002 r7:60000113 r6:ec851d8c r5:85905400 r4:85905400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85905400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec851e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849f4600 r4:00000000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:858d378c r4:858d3400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85905400 r8:849b7cac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xe05c1d28 to 0xe05c1d70) r4:82ac21e4 r4:00000000 r5:00001000 r4:dfd53000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xe05c1fb0 to 0xe05c1ff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:505:5859 blocked for more than 472 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:505 state:D stack:0 pid:5859 tgid:5859 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec855d84 r8:00000002 r7:60000013 r6:ec855d8c r5:85906000 r4:85906000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85906000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec855e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849f4780 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85906000 r7:00000000 r6:83018200 r5:00001000 r4:7f081000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc0f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858d3b8c r4:858d3800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858d3b8c r4:849b7d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85906000 r8:849b7dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849b7d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849b7d80 r8:80287e08 r7:ec851e60 r6:849b7e00 r5:85906000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec855fb0 to 0xec855ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849f4480 INFO: task kworker/1:505:5859 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 r4:00000000 r5:84be0b8c r4:84be0800 r4:84bb2000 Exception stack(0xe05c1fb0 to 0xe05c1ff8) r4:84ba8980 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:858d3f8c r4:858d3c00 r10:61c88647 r9:85906c00 r8:849b7eac r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: 9df27000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:507:5863 blocked for more than 472 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:507 state:D stack:0 pid:5863 tgid:5863 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec859d84 r8:00000002 r7:60000113 r6:ec859d8c r5:85903000 r4:85903000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85903000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec859e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849f4a40 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85903000 r7:00000000 r6:83018200 r5:00001000 r4:7f085000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc7f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8471eb8c r4:8471e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8471eb8c r4:849b7f80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85903000 r8:849b7fac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849b7f80 r10:00000000 r9:849b7f80 r8:80287e08 r7:ec835e60 r6:84bc8000 r5:85903000 task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:508:5865 blocked for more than 472 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:508 state:D stack:0 pid:5865 tgid:5865 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec861d84 r8:00000002 r7:60000113 r6:ec861d8c r5:85908000 r4:85908000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85908000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec861e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849f4d40 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85908000 r7:00000000 r6:83018200 r5:00001000 r4:7f089000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebcbb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858dc78c r4:858dc400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858dc78c r4:84bc8080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85908000 r8:84bc80ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bc8080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bc8080 r8:80287e08 r7:ec859e60 r6:84bc8100 r5:85908000 r4:00000001 Exception stack(0xec861fb0 to 0xec861ff8) Workqueue: events bpf_prog_free_deferred 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 INFO: task kworker/1:509:5867 blocked for more than 472 seconds. r4:85908c00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec865e08 r9:83018205 r8:85908c00 r7:00000000 r6:83018200 r5:00001000 r4:7f087000 r5:858dc38c r4:858dc000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r4:82ac21e4 r4:00000000 r5:84be0b8c r4:84be0800 r4:84bb2000 Exception stack(0xe05c1fb0 to 0xe05c1ff8) INFO: task kworker/1:510:5870 blocked for more than 472 seconds. "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:510 state:D stack:0 pid:5870 tgid:5870 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec869d84 r8:00000002 r7:60000113 r6:ec869d8c r5:85909800 r4:85909800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85909800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec869e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849f4f00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85909800 r7:00000000 r6:83018200 r5:00001000 r4:7f08b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebcd1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858dcb8c r4:858dc800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858dcb8c r4:84bc8280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85909800 r8:84bc82ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bc8280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bc8280 r8:80287e08 r7:ec861e60 r6:84bc8300 r5:85909800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec869fb0 to 0xec869ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849f4b40 INFO: task kworker/1:510:5870 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: 9e7d4000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:858dd38c r4:858dd000 r10:61c88647 r9:8590a400 r8:84bc83ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849f4d80 [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: 9eadb000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:512 state:D stack:0 pid:5873 tgid:5873 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec871d84 r8:00000002 r7:60000013 r6:ec871d8c r5:8590b000 r4:8590b000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8590b000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec871e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbdf80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8590b000 r7:00000000 r6:83018200 r5:00001000 r4:7f08d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebcfd000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858dcf8c r4:858dcc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858dcf8c r4:84bc8480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8590b000 r8:84bc84ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bc8480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xe05c1d28 to 0xe05c1d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r5:84be0b8c r4:84be0800 r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:8590bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 r5:858dd78c r4:858dd400 r10:61c88647 r9:8590bc00 r8:84bc85ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: 9ee64000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:855:5877 blocked for more than 472 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:855 state:D stack:0 pid:5877 tgid:5877 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec87dd84 r8:00000002 r7:60000013 r6:ec87dd8c r5:8590d400 r4:8590d400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8590d400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec87de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r9:83018005 r8:8590d400 r7:00000000 r6:83018000 r5:00001000 r4:7f06b000 r5:8588738c r4:85887000 r7:dddced80 r6:83018000 r5:8588738c r4:84bddf80 r10:00000000 r9:84bddf80 r8:80287e08 r7:ec825e60 r6:84bc8680 r5:8590d400 task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 1d60: 80230ad0 80239bb0 800f0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8291a684 r9:ec85dd84 r8:00000002 r7:60000113 r6:ec85dd8c r5:8590e000 r4:8590e000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8590e000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec85de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8580d780 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8590e000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5fd000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8588638c r4:85886000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8588638c r4:8583a000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8590e000 r8:8583a02c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8583a000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8583a000 r8:80287e08 r7:ec87de60 r6:84bc8700 r5:8590e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec85dfb0 to 0xec85dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8583b140 INFO: task kworker/0:856:5879 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: 9f12e000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:84be0b8c r4:84be0800 r4:84bb2000 Exception stack(0xe05c1fb0 to 0xe05c1ff8) INFO: task kworker/1:514:5881 blocked for more than 472 seconds. r5:8590ec00 r4:8291a680 r4:00000000 r4:00000000 r5:858ddb8c r4:858dd800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:84bc8780 9fa0: 00000000 00000000 00000000 00000000 [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r5:00001000 r4:dfd53000 r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:515 state:D stack:0 pid:5882 tgid:5882 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec885d84 r8:00000002 r7:60000013 r6:ec885d8c r5:8590c800 r4:8590c800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8590c800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec885e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84868a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8590c800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec583000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858de38c r4:858de000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858de38c r4:84bc8880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8590c800 r8:84bc88ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bc8880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bc8880 r8:80287e08 r7:ec879e60 r6:84bc8900 r5:8590c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec885fb0 to 0xec885ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84868380 INFO: task kworker/1:515:5882 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: 9f645000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:e05c1dc0 r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8291a684 r9:ec889d84 r8:00000002 r7:60000113 r6:ec889d8c r5:85910000 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:858ddf8c r4:858ddc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:84bc8980 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r4:82ac21e4 r4:00000000 r5:84be0b8c r4:84be0800 r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:84ba8980 INFO: task kworker/1:517:5886 blocked for more than 472 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:517 state:D stack:0 pid:5886 tgid:5886 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec881d84 r8:00000002 r7:60000113 r6:ec881d8c r5:85910c00 r4:85910c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85910c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec881e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84868e40 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85910c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a3000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec5c3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858def8c r4:858dec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858def8c r4:84bc8a80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85910c00 r8:84bc8aac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bc8a80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bc8a80 r8:80287e08 r7:ec885e60 r6:84bc8b00 r5:85910c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec881fb0 to 0xec881ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84868880 INFO: task kworker/1:517:5886 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: 9f9e0000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8291a684 r9:ec891d84 r8:00000002 r7:60000013 r6:ec891d8c r5:85911800 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec891e08 r5:00001000 r4:ec599000 r5:858de78c r4:858de400 r10:61c88647 r9:85911800 r8:84bc8bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:519:5890 blocked for more than 472 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:519 state:D stack:0 pid:5890 tgid:5890 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec895d84 r8:00000002 r7:60000013 r6:ec895d8c r5:85912400 r4:85912400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85912400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec895e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84868d00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85912400 r7:00000000 r6:83018200 r5:00001000 r4:7f09d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec5ab000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858deb8c r4:858de800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858deb8c r4:84bc8c80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85912400 r8:84bc8cac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bc8c80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bc8c80 r8:80287e08 r7:ec881e60 r6:84bc8d00 r5:85912400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec899d84 r8:00000002 r7:60000113 r6:ec899d8c r5:85913000 r4:85913000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85913000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec899e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84868fc0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85913000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec5d3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858df38c r4:858df000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858df38c r4:84bc8d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85913000 r8:84bc8dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bc8d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bc8d80 r8:80287e08 r7:ec881e60 r6:84bc8e00 r5:85913000 r4:00000001 Exception stack(0xec899fb0 to 0xec899ff8) Workqueue: events bpf_prog_free_deferred 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:8502bc00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8a5e08 r4:00000000 r5:858dfb8c r4:858df800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858dfb8c r4:84bc8e80 r4:84bc8e80 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe05c1d28 to 0xe05c1d70) [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:8502d400 [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:843e5240 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8502d400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a7000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec6ad000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858df78c r4:858df400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858df78c r4:84bc8f00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8502d400 r8:84bc8f2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bc8f00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bc8f00 r8:80287e08 r7:ec8a5e60 r6:8583a100 r5:8502d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec8a9fb0 to 0xec8a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84868dc0 INFO: task kworker/1:522:5895 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: a042e000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 r5:84be0b8c r4:84be0800 r4:84bb2000 Exception stack(0xe05c1fb0 to 0xe05c1ff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r5:8502ec00 r4:8291a680 r4:00000000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:858dff8c r4:858dfc00 r10:61c88647 r9:8502ec00 r8:8582a02c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xe05c1d28 to 0xe05c1d70) r4:82ac21e4 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xe05c1fb0 to 0xe05c1ff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:8502e000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8bde08 r4:00000000 r5:847fc38c r4:847fc000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:847fc38c r4:8582a080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8502e000 r8:8582a0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8582a080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8582a080 r8:80287e08 r7:ec8b1e60 r6:8583a200 r5:8502e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec8bdfb0 to 0xec8bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85835200 INFO: task kworker/1:524:5900 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: a049d000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:525:5901 blocked for more than 472 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:525 state:D stack:0 pid:5901 tgid:5901 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec8c1d84 r8:00000002 r7:60000113 r6:ec8c1d8c r5:8502a400 r4:8502a400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8502a400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8c1e08 r4:00000000 r5:847fdf8c r4:847fdc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:8502a400 r8:8582a12c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:82ac21e4 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:8291a684 r9:ec8cdd84 r8:00000002 r7:60000013 r6:ec8cdd8c r5:8502c800 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:847fc78c r4:847fc400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:8502c800 r8:8582a22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: a07a6000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:527:5905 blocked for more than 472 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:527 state:D stack:0 pid:5905 tgid:5905 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec8e1d84 r8:00000002 r7:60000113 r6:ec8e1d8c r5:858a0c00 r4:858a0c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:858a0c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8e1e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85835700 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:858a0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0b1000 r5:847fcb8c r4:847fc800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 1d60: 80230ad0 80239bb0 800f0013 ffffffff [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xe05c1fb0 to 0xe05c1ff8) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ec8dd000 r5:847fcf8c r4:847fcc00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe05c1d28 to 0xe05c1d70) r4:e05c1dc0 r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:529:5909 blocked for more than 472 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:529 state:D stack:0 pid:5909 tgid:5909 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec901d84 r8:00000002 r7:60000113 r6:ec901d8c r5:858a1800 r4:858a1800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:858a1800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec901e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85835940 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:858a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f0b5000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8ed000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:847fd38c r4:847fd000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:847fd38c r4:8582a300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:858a1800 r8:8582a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8582a300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8582a300 r8:80287e08 r7:ec8c1e60 r6:8583a480 r5:858a1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec901fb0 to 0xec901ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:84bb2000 Exception stack(0xe05c1fb0 to 0xe05c1ff8) INFO: task kworker/1:530:5912 blocked for more than 472 seconds. r4:858a2400 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec915e08 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:847fd78c r4:847fd400 r10:61c88647 r9:858a2400 r8:8582a3ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: a1015000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:531:5913 blocked for more than 472 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:531 state:D stack:0 pid:5913 tgid:5913 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r10:8291a684 r9:ec921d84 r8:00000002 r7:60000013 r6:ec921d8c r5:858a3000 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:847fdb8c r4:847fd800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:847fdb8c r4:8582a400 r10:00000000 r9:8582a400 r8:80287e08 r7:ec8c1e60 r6:8583a580 r5:858a3000 Workqueue: events bpf_prog_free_deferred 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ec94d000 r5:847feb8c r4:847fe800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: a16ae000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:533:5917 blocked for more than 472 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:533 state:D stack:0 pid:5917 tgid:5917 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec941d84 r8:00000002 r7:60000113 r6:ec941d8c r5:858a6000 r4:858a6000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:858a6000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec941e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85835e40 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:858a6000 r7:00000000 r6:83018200 r5:00001000 r4:7f0bd000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec92d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:847fe38c r4:847fe000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:858a6000 r8:8582a52c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xe05c1d28 to 0xe05c1d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r5:84be0b8c r4:84be0800 r4:84bb2000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:858a6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0bf000 r5:847fe78c r4:847fe400 r10:61c88647 r9:858a6c00 r8:8582a62c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85835f80 INFO: task kworker/1:534:5919 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: a193e000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:535:5921 blocked for more than 472 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:535 state:D stack:0 pid:5921 tgid:5921 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec961d84 r8:00000002 r7:60000013 r6:ec961d8c r5:858a4800 r4:858a4800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:858a4800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec961e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8580a400 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:858a4800 r7:00000000 r6:83018200 r5:00001000 r4:7f0cd000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:847fff8c r4:847ffc00 r7:ddde2d80 r6:83018200 r5:847fff8c r4:8582a580 r4:00000001 r4:8583be40 [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r4:82ac21e4 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:847fef8c r4:847fec00 r10:61c88647 r9:85020c00 r8:8582a6ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85835140 Call trace: Exception stack(0xe05c1d28 to 0xe05c1d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r5:00001000 r4:dfd53000 r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:537:5925 blocked for more than 472 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:537 state:D stack:0 pid:5925 tgid:5925 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec981d84 r8:00000002 r7:60000013 r6:ec981d8c r5:85022400 r4:85022400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85022400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec981e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8583b440 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0c7000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec96d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:847ff38c r4:847ff000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:847ff38c r4:8582a700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8582a72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8582a700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8582a700 r8:80287e08 r7:ec961e60 r6:8583a880 r5:85022400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec981fb0 to 0xec981ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8583be40 INFO: task kworker/1:537:5925 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: a2092000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:84be0b8c r4:84be0800 r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 r4:84bb2000 r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:84ba8980 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:538 state:D stack:0 pid:5927 tgid:5927 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec991d84 r8:00000002 r7:60000013 r6:ec991d8c r5:85023000 r4:85023000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85023000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec991e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8580a080 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85023000 r7:00000000 r6:83018200 r5:00001000 r4:7f0c9000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec97d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:847ff78c r4:847ff400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:847ff78c r4:8582a800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85023000 r8:8582a82c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8582a800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8582a800 r8:80287e08 r7:ec961e60 r6:8583a900 r5:85023000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec991fb0 to 0xec991ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8580a100 INFO: task kworker/1:538:5927 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: a2092000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:539:5930 blocked for more than 472 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:539 state:D stack:0 pid:5930 tgid:5930 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec9a5d84 r8:00000002 r7:60000013 r6:ec9a5d8c r5:85020000 r4:85020000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85020000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9a5e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8580a2c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0cb000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec98d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:847ffb8c r4:847ff800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:847ffb8c r4:8582a780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8582a7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8582a780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8582a780 r8:80287e08 r7:ec961e60 r6:8583a980 r5:85020000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec9a5fb0 to 0xec9a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8580a200 INFO: task kworker/1:539:5930 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: a25ed000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:540:5931 blocked for more than 472 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:540 state:D stack:0 pid:5931 tgid:5931 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec9b1d84 r8:00000002 r7:60000013 r6:ec9b1d8c r5:85021800 r4:85021800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85021800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9b1e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8580a7c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85021800 r7:00000000 r6:83018200 r5:00001000 r4:7f02b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0e7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85948f8c r4:85948c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85948f8c r4:8582a880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85021800 r8:8582a8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8582a880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8582a880 r8:80287e08 r7:ec961e60 r6:8583aa00 r5:85021800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec9b1fb0 to 0xec9b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8580a3c0 INFO: task kworker/1:540:5931 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: a2660000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:541:5933 blocked for more than 472 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:541 state:D stack:0 pid:5933 tgid:5933 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec9c1d84 r8:00000002 r7:60000013 r6:ec9c1d8c r5:85023c00 r4:85023c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85023c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9c1e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8580a580 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85023c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0cf000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec9ad000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8594838c r4:85948000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8594838c r4:8582a900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85023c00 r8:8582a92c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8582a900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8582a900 r8:80287e08 r7:ec9b1e60 r6:8583aa80 r5:85023c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec9c1fb0 to 0xec9c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8580a280 INFO: task kworker/1:541:5933 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: a2660000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:542:5935 blocked for more than 472 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:542 state:D stack:0 pid:5935 tgid:5935 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec7a1d84 r8:00000002 r7:60000113 r6:ec7a1d8c r5:85025400 r4:85025400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85025400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec7a1e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8580a300 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85025400 r7:00000000 r6:83018200 r5:00001000 r4:7f015000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8594878c r4:85948400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8594878c r4:8582a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85025400 r8:8582a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8582a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8582a980 r8:80287e08 r7:ec9b1e60 r6:8583ab00 r5:85025400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec7a1fb0 to 0xec7a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8580a680 INFO: task kworker/1:542:5935 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: a2a8c000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:543:5937 blocked for more than 472 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:543 state:D stack:0 pid:5937 tgid:5937 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec7b9d84 r8:00000002 r7:60000013 r6:ec7b9d8c r5:85026c00 r4:85026c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85026c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec7b9e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8580a840 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85026c00 r7:00000000 r6:83018200 r5:00001000 r4:7f029000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85948b8c r4:85948800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85948b8c r4:8582aa00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85026c00 r8:8582aa2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8582aa00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8582aa00 r8:80287e08 r7:ec9b1e60 r6:8583ab80 r5:85026c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec7b9fb0 to 0xec7b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8580a5c0 INFO: task kworker/1:543:5937 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: a2deb000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:544:5939 blocked for more than 472 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:544 state:D stack:0 pid:5939 tgid:5939 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec9c9d84 r8:00000002 r7:60000113 r6:ec9c9d8c r5:85026000 r4:85026000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85026000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9c9e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8580ae00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85026000 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb785000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85949b8c r4:85949800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85949b8c r4:8582aa80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85026000 r8:8582aaac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8582aa80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8582aa80 r8:80287e08 r7:ec9b1e60 r6:8583ac00 r5:85026000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec9c9fb0 to 0xec9c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8580a700 INFO: task kworker/1:544:5939 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: a2deb000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:545:5941 blocked for more than 472 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:545 state:D stack:0 pid:5941 tgid:5941 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec9d1d84 r8:00000002 r7:60000113 r6:ec9d1d8c r5:85024800 r4:85024800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85024800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9d1e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8580aa80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85024800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb209000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8594938c r4:85949000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8594938c r4:8582ab00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85024800 r8:8582ab2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8582ab00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8582ab00 r8:80287e08 r7:ec9c9e60 r6:8583ac80 r5:85024800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec9d1fb0 to 0xec9d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8580a9c0 INFO: task kworker/1:545:5941 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: a2fbe000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:546:5945 blocked for more than 472 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:546 state:D stack:0 pid:5945 tgid:5945 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec9b5d84 r8:00000002 r7:60000113 r6:ec9b5d8c r5:858a8000 r4:858a8000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:858a8000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9b5e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8580ad00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:858a8000 r7:00000000 r6:83018200 r5:00001000 r4:7f033000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb71d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8594978c r4:85949400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8594978c r4:8582ab80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:858a8000 r8:8582abac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8582ab80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8582ab80 r8:80287e08 r7:ec9c9e60 r6:8583ad00 r5:858a8000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec9b5fb0 to 0xec9b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8580ab00 INFO: task kworker/1:546:5945 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: a32eb000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:857:5947 blocked for more than 472 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:857 state:D stack:0 pid:5947 tgid:5947 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec9cdd84 r8:00000002 r7:60000113 r6:ec9cdd8c r5:858a8c00 r4:858a8c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:858a8c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9cde08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856c8380 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:858a8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f069000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb3b9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85886f8c r4:85886c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85886f8c r4:8583ad80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:858a8c00 r8:8583adac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8583ad80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8583ad80 r8:80287e08 r7:ec87de60 r6:8583ae00 r5:858a8c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec9cdfb0 to 0xec9cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8580d6c0 INFO: task kworker/0:857:5947 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: a3583000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:547:5948 blocked for more than 472 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:547 state:D stack:0 pid:5948 tgid:5948 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec9d5d84 r8:00000002 r7:60000113 r6:ec9d5d8c r5:858a9800 r4:858a9800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:858a9800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9d5e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8580af40 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:858a9800 r7:00000000 r6:83018200 r5:00001000 r4:7f037000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb90d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85949f8c r4:85949c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85949f8c r4:8582ac00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:858a9800 r8:8582ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8582ac00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8582ac00 r8:80287e08 r7:ec9c9e60 r6:8583ae80 r5:858a9800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec9d5fb0 to 0xec9d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8580ad40 INFO: task kworker/1:547:5948 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: a3583000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:548:5951 blocked for more than 472 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:548 state:D stack:0 pid:5951 tgid:5951 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec9ddd84 r8:00000002 r7:60000013 r6:ec9ddd8c r5:858ab000 r4:858ab000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:858ab000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9dde08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8580aa00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:858ab000 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb945000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8594a38c r4:8594a000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8594a38c r4:8582ad00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:858ab000 r8:8582ad2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8582ad00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8582ad00 r8:80287e08 r7:ec9d5e60 r6:8583af00 r5:858ab000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec9ddfb0 to 0xec9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8580adc0 INFO: task kworker/1:548:5951 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: a3583000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:549:5953 blocked for more than 472 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:549 state:D stack:0 pid:5953 tgid:5953 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec9e5d84 r8:00000002 r7:60000113 r6:ec9e5d8c r5:858ac800 r4:858ac800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:858ac800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9e5e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857f1980 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:858ac800 r7:00000000 r6:83018200 r5:00001000 r4:7f049000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebbe3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8594c38c r4:8594c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8594c38c r4:8582ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:858ac800 r8:8582acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8582ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8582ac80 r8:80287e08 r7:ec9dde60 r6:8583af80 r5:858ac800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec9e5fb0 to 0xec9e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8580ae40 INFO: task kworker/1:549:5953 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: a3acc000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:550:5955 blocked for more than 472 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:550 state:D stack:0 pid:5955 tgid:5955 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec9edd84 r8:00000002 r7:60000113 r6:ec9edd8c r5:858ad400 r4:858ad400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:858ad400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9ede08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8583bac0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:858ad400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb9c5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8594a78c r4:8594a400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8594a78c r4:8582ad80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:858ad400 r8:8582adac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8582ad80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8582ad80 r8:80287e08 r7:ec9e5e60 r6:857e6000 r5:858ad400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec9edfb0 to 0xec9edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857f1000 INFO: task kworker/1:550:5955 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: a3cba000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:551:5956 blocked for more than 472 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:551 state:D stack:0 pid:5956 tgid:5956 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec9f1d84 r8:00000002 r7:60000013 r6:ec9f1d8c r5:858abc00 r4:858abc00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:858abc00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9f1e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857f1040 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:858abc00 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba19000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8594ab8c r4:8594a800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8594ab8c r4:8582ae00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:858abc00 r8:8582ae2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8582ae00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8582ae00 r8:80287e08 r7:ec9e5e60 r6:857e6080 r5:858abc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec9f1fb0 to 0xec9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857f1080 INFO: task kworker/1:551:5956 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: a3cba000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:552:5958 blocked for more than 472 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:552 state:D stack:0 pid:5958 tgid:5958 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec9f9d84 r8:00000002 r7:60000013 r6:ec9f9d8c r5:858aa400 r4:858aa400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:858aa400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9f9e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857f1300 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:858aa400 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebad5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8594af8c r4:8594ac00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:858aa400 r8:8582aeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8582ae80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8582ae80 r8:80287e08 r7:ec9e5e60 r6:857e6100 r5:858aa400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec9f9fb0 to 0xec9f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857f11c0 INFO: task kworker/1:552:5958 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: a3fae000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:553:5960 blocked for more than 473 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:553 state:D stack:0 pid:5960 tgid:5960 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eca01d84 r8:00000002 r7:60000013 r6:eca01d8c r5:859b8000 r4:859b8000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:859b8000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca01e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857f14c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:859b8000 r7:00000000 r6:83018200 r5:00001000 r4:7f041000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb11000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8594b38c r4:8594b000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:859b8000 r8:8582af2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe05c1d28 to 0xe05c1d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r5:84be0b8c r4:84be0800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:859b9800 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca09e08 r5:00001000 r4:ebb4b000 r5:8594b78c r4:8594b400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: a4840000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:555:5964 blocked for more than 473 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:555 state:D stack:0 pid:5964 tgid:5964 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eca11d84 r8:00000002 r7:60000113 r6:eca11d8c r5:859b8c00 r4:859b8c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:859b8c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca11e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:ebb6d000 r5:8594bb8c r4:8594b800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:84bc8f80 r8:80287e08 r7:ec9e5e60 r6:857e6280 r5:859b8c00 task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:800f0013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:84bb2000 Exception stack(0xe05c1fb0 to 0xe05c1ff8) INFO: task kworker/1:556:5966 blocked for more than 473 seconds. r4:859bbc00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca19e08 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xeca19fb0 to 0xeca19ff8) Workqueue: events bpf_prog_free_deferred 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 r4:00000000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:557:5969 blocked for more than 473 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:557 state:D stack:0 pid:5969 tgid:5969 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eca25d84 r8:00000002 r7:60000013 r6:eca25d8c r5:859bb000 r4:859bb000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:859bb000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca25e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857f1a80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:859bb000 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec5e5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8594c78c r4:8594c400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8594c78c r4:857e8080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:859bb000 r8:857e80ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857e8080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred 1d20: a4ff0000 dfb47000 00000001 80239b98 7f2fb000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca31e08 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8594db8c r4:8594d800 r4:857e8100 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r5:84be0b8c r4:84be0800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:559:5973 blocked for more than 473 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:559 state:D stack:0 pid:5973 tgid:5973 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eca35d84 r8:00000002 r7:60000113 r6:eca35d8c r5:859be000 r4:859be000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:859be000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca35e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857f1bc0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:859be000 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec5f9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8594cb8c r4:8594c800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8594cb8c r4:857e8180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:859be000 r8:857e81ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857e8180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857e8180 r8:80287e08 r7:eca31e60 r6:857e6480 r5:859be000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca35fb0 to 0xeca35ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857f1ac0 INFO: task kworker/1:559:5973 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: a5395000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r5:00001000 r4:dfd53000 r4:84bb2000 Exception stack(0xe05c1fb0 to 0xe05c1ff8) INFO: task kworker/1:560:5974 blocked for more than 473 seconds. [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8594cf8c r4:8594cc00 r10:61c88647 r9:859bc800 r8:857e822c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xe05c1d28 to 0xe05c1d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r4:859bd400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:859bd400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca41e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857f1e80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:859bd400 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec651000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8594d38c r4:8594d000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8594d38c r4:857e8280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:859bd400 r8:857e82ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857e8280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857e8280 r8:80287e08 r7:eca31e60 r6:857e6580 r5:859bd400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca41fb0 to 0xeca41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857f1800 INFO: task kworker/1:561:5976 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: a5b91000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8594d78c r4:8594d400 r10:61c88647 r9:858ae000 r8:857e832c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 1d20: a5b91000 dfb47000 00000001 80239b98 7f2fb000 00000001 r4:00000000 r5:84be0b8c r4:84be0800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:84ba8980 Workqueue: events bpf_prog_free_deferred r4:858aec00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:858aec00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca51e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857d1040 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:858aec00 r7:00000000 r6:83018200 r5:00001000 r4:7f057000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec7bb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8594df8c r4:8594dc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8594df8c r4:857e8380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:858aec00 r8:857e83ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857e8380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857e8380 r8:80287e08 r7:eca31e60 r6:857e6680 r5:858aec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca51fb0 to 0xeca51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857f1dc0 INFO: task kworker/1:563:5980 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: a6179000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:564:5983 blocked for more than 473 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:564 state:D stack:0 pid:5983 tgid:5983 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eca55d84 r8:00000002 r7:60000113 r6:eca55d8c r5:859c8000 r4:859c8000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:859c8000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca55e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857d1480 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:859c8000 r7:00000000 r6:83018200 r5:00001000 r4:7f05b000 r5:8594e78c r4:8594e400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:859c8000 r8:857e842c r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 1d60: 80230ad0 80239bb0 800f0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:565:5984 blocked for more than 473 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:565 state:D stack:0 pid:5984 tgid:5984 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eca59d84 r8:00000002 r7:60000013 r6:eca59d8c r5:859c8c00 r4:859c8c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:859c8c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca59e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857d13c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:859c8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec9bd000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8594e38c r4:8594e000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8594e38c r4:857e8480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:859c8c00 r8:857e84ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857e8480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857e8480 r8:80287e08 r7:eca55e60 r6:857e6780 r5:859c8c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca59fb0 to 0xeca59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred 1d20: a6762000 dfb47000 00000001 80239b98 7f2fb000 00000001 r4:00000000 r5:84be0b8c r4:84be0800 r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:84ba8980 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca7de08 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8594ef8c r4:8594ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8594ef8c r4:857e8580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:859cbc00 r8:857e85ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857e8580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857e8580 r8:80287e08 r7:eca7de60 r6:857e6880 r5:859cbc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca85fb0 to 0xeca85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857d1300 INFO: task kworker/1:567:5989 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: a6c18000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:568:5990 blocked for more than 473 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:568 state:D stack:0 pid:5990 tgid:5990 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eca91d84 r8:00000002 r7:60000113 r6:eca91d8c r5:859ca400 r4:859ca400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:859ca400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca91e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r9:83018205 r8:859ca400 r7:00000000 r6:83018200 r5:00001000 r4:7f09f000 r5:8594f78c r4:8594f400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 Exception stack(0xe05c1fb0 to 0xe05c1ff8) INFO: task kworker/1:569:5992 blocked for more than 473 seconds. [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:eca8d000 r5:8594f38c r4:8594f000 r10:61c88647 r9:859cb000 r8:857e86ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:570:5995 blocked for more than 473 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:570 state:D stack:0 pid:5995 tgid:5995 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecab5d84 r8:00000002 r7:60000013 r6:ecab5d8c r5:859cc800 r4:859cc800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:859cc800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecab5e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857d1ac0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:859cc800 r7:00000000 r6:83018200 r5:00001000 r4:7f0c5000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecaad000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8594fb8c r4:8594f800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8594fb8c r4:857e8700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:857e8700 r8:80287e08 r7:eca91e60 r6:857e6a00 r5:859cc800 Workqueue: events bpf_prog_free_deferred 1d20: a6e2e000 dfb47000 00000001 80239b98 7f2fb000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecac1e08 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r5:84be0b8c r4:84be0800 r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:572:5998 blocked for more than 473 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:572 state:D stack:0 pid:5998 tgid:5998 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecacdd84 r8:00000002 r7:60000113 r6:ecacdd8c r5:859cec00 r4:859cec00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:859cec00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecacde08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857d1ec0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:859cec00 r7:00000000 r6:83018200 r5:00001000 r4:7f0d5000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecad9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8595078c r4:85950400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8595078c r4:857e8800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:859cec00 r8:857e882c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857e8800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857e8800 r8:80287e08 r7:ecac1e60 r6:857e6b00 r5:859cec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecacdfb0 to 0xecacdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857d1a80 INFO: task kworker/1:572:5998 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: a7775000 dfb47000 00000001 80239b98 7f2fb000 00000001 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r4:00000000 r9:83018205 r8:859ce000 r7:00000000 r6:83018200 r5:00001000 r4:7f0d3000 r5:8595038c r4:85950000 r10:61c88647 r9:859ce000 r8:857e88ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r5:800f0013 r4:80239bb0 r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:574:6003 blocked for more than 473 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:574 state:D stack:0 pid:6003 tgid:6003 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecae5d84 r8:00000002 r7:60000113 r6:ecae5d8c r5:85048000 r4:85048000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85048000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecae5e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8583b140 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85048000 r7:00000000 r6:83018200 r5:00001000 r4:7f0d7000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecae1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85950b8c r4:85950800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85048000 r8:857e892c r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecaf1e08 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85950f8c r4:85950c00 r4:857e8980 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857e9980 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8504b000 r7:00000000 r6:83018200 r5:00001000 r4:7f0db000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecaf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8595138c r4:85951000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8595138c r4:857e8a00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8504b000 r8:857e8a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857e8a00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857e8a00 r8:80287e08 r7:ecaf1e60 r6:857e6d00 r5:8504b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb0dfb0 to 0xecb0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857e9100 INFO: task kworker/1:576:6008 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: a7d24000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:577:6009 blocked for more than 473 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:577 state:D stack:0 pid:6009 tgid:6009 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecb11d84 r8:00000002 r7:60000013 r6:ecb11d8c r5:85049800 r4:85049800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85049800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb11e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857d1fc0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85049800 r7:00000000 r6:83018200 r5:00001000 r4:7f0dd000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xecb11fb0 to 0xecb11ff8) task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:578:6011 blocked for more than 473 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:578 state:D stack:0 pid:6011 tgid:6011 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecb21d84 r8:00000002 r7:60000013 r6:ecb21d8c r5:8504c800 r4:8504c800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8504c800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb21e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85747680 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8504c800 r7:00000000 r6:83018200 r5:00001000 r4:7f0e7000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb4d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85952b8c r4:85952800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85952b8c r4:857e8b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8504c800 r8:857e8b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857e8b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857e8b00 r8:80287e08 r7:ecb11e60 r6:857e6e00 r5:8504c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xe05c1d28 to 0xe05c1d70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:85916c00 r4:8291a680 [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecab1e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85747040 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85916c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0df000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb19000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85951b8c r4:85951800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85951b8c r4:857e8b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85916c00 r8:857e8bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857e8b80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857e8b80 r8:80287e08 r7:ecb21e60 r6:857e8c00 r5:85916c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecab1fb0 to 0xecab1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85747080 INFO: task kworker/1:579:6012 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: a8a00000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r4:e05c1dc0 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:84ba8980 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ecb29000 r5:85951f8c r4:85951c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85915400 r8:857e8cac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857e8c80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857e8c80 r8:80287e08 r7:ecb21e60 r6:857e8d00 r5:85915400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb1dfb0 to 0xecb1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85747180 INFO: task kworker/1:580:6017 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: a8a00000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r4:82ac21e4 r4:00000000 r5:84be0b8c r4:84be0800 r4:84bb2000 Exception stack(0xe05c1fb0 to 0xe05c1ff8) INFO: task kworker/1:581:6018 blocked for more than 473 seconds. r5:85914800 r4:8291a680 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:8595238c r4:85952000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xecb39fb0 to 0xecb39ff8) INFO: task kworker/1:581:6018 is blocked on a mutex likely owned by task kworker/1:204:3660. 1d20: a8dbe000 dfb47000 00000001 80239b98 7f2fb000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:85913c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0e5000 r5:8595278c r4:85952400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8595278c r4:857e8e80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85913c00 r8:857e8eac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857e8e80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857e8e80 r8:80287e08 r7:ecb21e60 r6:857e8f00 r5:85913c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec9d9fb0 to 0xec9d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857475c0 INFO: task kworker/1:582:6019 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: a9047000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:583:6021 blocked for more than 473 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:583 state:D stack:0 pid:6021 tgid:6021 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecb5dd84 r8:00000002 r7:60000013 r6:ecb5dd8c r5:859bec00 r4:859bec00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:859bec00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb5de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r4:00000000 r5:85952f8c r4:85952c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:859bec00 r8:857e8fac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 1d20: a91d0000 dfb47000 00000001 80239b98 7f2fb000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:584:6023 blocked for more than 473 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:584 state:D stack:0 pid:6023 tgid:6023 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecb51d84 r8:00000002 r7:60000113 r6:ecb51d8c r5:858a5400 r4:858a5400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:858a5400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb51e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85747b40 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:858a5400 r7:00000000 r6:83018200 r5:00001000 r4:7f0eb000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb65000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8595338c r4:85953000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8595338c r4:8573d080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:858a5400 r8:8573d0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8573d080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8573d080 r8:80287e08 r7:ecb5de60 r6:8573d100 r5:858a5400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb51fb0 to 0xecb51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85747840 INFO: task kworker/1:584:6023 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: a9421000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:84bb2000 Exception stack(0xe05c1fb0 to 0xe05c1ff8) INFO: task kworker/1:585:6025 blocked for more than 473 seconds. [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r9:83018205 r8:85918000 r7:00000000 r6:83018200 r5:00001000 r4:7f0ed000 r5:8595378c r4:85953400 r10:61c88647 r9:85918000 r8:8573d1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 1d20: a9794000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 task:kworker/1:586 state:D stack:0 pid:6027 tgid:6027 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:85953f8c r4:85953c00 r7:ddde2d80 r6:83018200 r5:85953f8c r4:8573d280 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 r5:84be0b8c r4:84be0800 1fa0: 00000000 00000000 00000000 00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb81e08 r5:85953b8c r4:85953800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85953b8c r4:8573d380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85919800 r8:8573d3ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8573d380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8573d380 r8:80287e08 r7:ecb75e60 r6:8573d400 r5:85919800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb81fb0 to 0xecb81ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85747b00 INFO: task kworker/1:587:6028 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: a9974000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000001 Not tainted 6.15.0-rc7-syzkaller #0 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb8de08 r5:8595438c r4:85954000 r7:ddde2d80 r6:83018200 r5:8595438c r4:8573d480 Exception stack(0xecb8dfb0 to 0xecb8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85747c00 INFO: task kworker/1:588:6032 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: a9b77000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r4:00000000 r9:83018205 r8:8591b000 r7:00000000 r6:83018200 r5:00001000 r4:7f0f5000 r5:8595478c r4:85954400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:8573d580 r8:80287e08 r7:ecb8de60 r6:8573d600 r5:8591b000 INFO: task kworker/1:589:6034 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: a9dc3000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:590:6035 blocked for more than 473 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:590 state:D stack:0 pid:6035 tgid:6035 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecbb1d84 r8:00000002 r7:60000013 r6:ecbb1d8c r5:8591bc00 r4:8591bc00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8591bc00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecbb1e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r4:00000000 r5:85954b8c r4:85954800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85954b8c r4:8573d680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8591bc00 r8:8573d6ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8573d680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8573d680 r8:80287e08 r7:ecba5e60 r6:8573d700 r5:8591bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecbb1fb0 to 0xecbb1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85729240 INFO: task kworker/1:590:6035 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) Exception stack(0xe05c1d28 to 0xe05c1d70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r5:84be0b8c r4:84be0800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r9:83018205 r8:8591c800 r7:00000000 r6:83018200 r5:00001000 r4:7f0fb000 r5:8595538c r4:85955000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8591c800 r8:8573d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8573d780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8573d780 r8:80287e08 r7:ecbb1e60 r6:8573d800 r5:8591c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb99fb0 to 0xecb99ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85729180 INFO: task kworker/1:591:6037 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: aa131000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 r4:84bb2000 Exception stack(0xe05c1fb0 to 0xe05c1ff8) Not tainted 6.15.0-rc7-syzkaller #0 r4:8591d400 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecbbde08 r5:00001000 r4:ecbb9000 r5:85954f8c r4:85954c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:8573d880 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xe05c1d28 to 0xe05c1d70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:593:6045 blocked for more than 473 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:593 state:D stack:0 pid:6045 tgid:6045 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecbd5d84 r8:00000002 r7:60000113 r6:ecbd5d8c r5:8591ec00 r4:8591ec00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8591ec00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecbd5e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857297c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8591ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8595578c r4:85955400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8595578c r4:8573d980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8591ec00 r8:8573d9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8573d980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8573d980 r8:80287e08 r7:ecb99e60 r6:8573da00 r5:8591ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecbd5fb0 to 0xecbd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85729800 INFO: task kworker/1:593:6045 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: aa422000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:859d0000 r7:00000000 r6:83018200 r5:00001000 r4:7f065000 r5:85955b8c r4:85955800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:8573da80 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe05c1d28 to 0xe05c1d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r5:84be0b8c r4:84be0800 r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:595:6048 blocked for more than 473 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:595 state:D stack:0 pid:6048 tgid:6048 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec8f5d84 r8:00000002 r7:60000013 r6:ec8f5d8c r5:859d1800 r4:859d1800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:859d1800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8f5e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85729500 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:859d1800 r7:00000000 r6:83018200 r5:00001000 r4:7f063000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdeb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8588678c r4:85886400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8588678c r4:8573db80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:859d1800 r8:8573dbac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8573db80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8573db80 r8:80287e08 r7:ec8d9e60 r6:8573dc00 r5:859d1800 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe05c1d28 to 0xe05c1d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:84bb2000 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 r5:8595638c r4:85956000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:8573dc80 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Call trace: Exception stack(0xe05c1d28 to 0xe05c1d70) r5:800f0013 r4:80239bb0 r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:858:6051 blocked for more than 473 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:858 state:D stack:0 pid:6051 tgid:6051 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec8d5d84 r8:00000002 r7:60000113 r6:ec8d5d8c r5:8504ec00 r4:8504ec00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8504ec00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8d5e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856c8780 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8504ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f06f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb815000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85887b8c r4:85887800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85887b8c r4:857e6e80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8504ec00 r8:857e6eac r7:82804d40 r6:dddced80 r5:dddceda0 r4:857e6e80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857e6e80 r8:80287e08 r7:ec87de60 r6:857e6f00 r5:8504ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec8d5fb0 to 0xec8d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:856c82c0 INFO: task kworker/0:858:6051 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r4:00000000 1d60: 80230ad0 80239bb0 800f0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-rc7-syzkaller #0 r4:8504d400 [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:8504d400 r7:00000000 r6:83018000 r5:00001000 r4:7f06d000 r5:8588778c r4:85887400 r10:61c88647 r9:8504d400 r8:857e6fac r7:82804d40 r6:dddced80 r5:dddceda0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 1d60: 80230ad0 80239bb0 800f0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:597:6054 blocked for more than 474 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:597 state:D stack:0 pid:6054 tgid:6054 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec905d84 r8:00000002 r7:60000113 r6:ec905d8c r5:8504a400 r4:8504a400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8504a400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec905e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8574b680 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8504a400 r7:00000000 r6:83018200 r5:00001000 r4:7f073000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba29000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85955f8c r4:85955c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85955f8c r4:8573dd80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8504a400 r8:8573ddac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8573dd80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8573dd80 r8:80287e08 r7:ec8f9e60 r6:856d5080 r5:8504a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec905fb0 to 0xec905ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85729a80 INFO: task kworker/1:597:6054 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 Exception stack(0xe05c1d28 to 0xe05c1d70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:8504bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f071000 r5:85887f8c r4:85887c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe05c1d28 to 0xe05c1d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:861:6057 blocked for more than 474 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:861 state:D stack:0 pid:6057 tgid:6057 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec935d84 r8:00000002 r7:60000013 r6:ec935d8c r5:859d3c00 r4:859d3c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:859d3c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec935e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856c8d80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:859d3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f079000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc11000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:844d638c r4:844d6000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:844d638c r4:856d5200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:859d3c00 r8:856d522c r7:82804d40 r6:dddced80 r5:dddceda0 r4:856d5200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856d5200 r8:80287e08 r7:ec919e60 r6:8573de00 r5:859d3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec935fb0 to 0xec935ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:856c8600 INFO: task kworker/0:861:6057 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r4:00000000 r5:800f0013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:862:6059 blocked for more than 474 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:862 state:D stack:0 pid:6059 tgid:6059 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec925d84 r8:00000002 r7:60000113 r6:ec925d8c r5:859d4800 r4:859d4800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:859d4800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec925e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856c8cc0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:844d678c r4:844d6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:856d5280 r8:80287e08 r7:ec935e60 r6:8573de80 r5:859d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec925fb0 to 0xec925ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:856c8940 INFO: task kworker/0:862:6059 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: ab98c000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:598:6062 blocked for more than 474 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:598 state:D stack:0 pid:6062 tgid:6062 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec939d84 r8:00000002 r7:60000113 r6:ec939d8c r5:859d5400 r4:859d5400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:859d5400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec939e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857f8300 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:859d5400 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebacb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85991b8c r4:85991800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85991b8c r4:8573df00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:859d5400 r8:8573df2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8573df00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8573df00 r8:80287e08 r7:ec8f9e60 r6:8573df80 r5:859d5400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec939fb0 to 0xec939ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85729800 INFO: task kworker/1:598:6062 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: ab98c000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:599:6063 blocked for more than 474 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:599 state:D stack:0 pid:6063 tgid:6063 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec955d84 r8:00000002 r7:60000113 r6:ec955d8c r5:859d6000 r4:859d6000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec955e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a7c500 r5:00001000 r4:eb1d5000 r5:8471fb8c r4:8471f800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8471fb8c r4:85716000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:85716000 r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 1d20: ac2fe000 dfb47000 00000001 80239b98 7f2fb000 00000001 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r5:00001000 r4:dfd53000 r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:863:6066 blocked for more than 474 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:863 state:D stack:0 pid:6066 tgid:6066 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec965d84 r8:00000002 r7:60000113 r6:ec965d8c r5:859d0c00 r4:859d0c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:859d0c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec965e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856c8ec0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:859d0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f07b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc6b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8598838c r4:85988000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8598838c r4:856d5300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:859d0c00 r8:856d532c r7:82804d40 r6:dddced80 r5:dddceda0 r4:856d5300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856d5300 r8:80287e08 r7:ec935e60 r6:85716100 r5:859d0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec965fb0 to 0xec965ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:856c8c00 INFO: task kworker/0:863:6066 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: ac2fe000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:864:6069 blocked for more than 474 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:864 state:D stack:0 pid:6069 tgid:6069 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec985d84 r8:00000002 r7:60000013 r6:ec985d8c r5:85920000 r4:85920000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85920000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec985e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856c8fc0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85920000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc99000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8598878c r4:85988400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8598878c r4:856d5380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85920000 r8:856d53ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:856d5380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856d5380 r8:80287e08 r7:ec965e60 r6:85716180 r5:85920000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec985fb0 to 0xec985ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:856c8f00 INFO: task kworker/0:864:6069 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: ac787000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r5:84be0b8c r4:84be0800 r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-rc7-syzkaller #0 Workqueue: events bpf_prog_free_deferred r4:85920c00 r5:85920c00 r4:8291a680 [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85920c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebcdd000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85988f8c r4:85988c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85988f8c r4:856d5400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85920c00 r8:856d542c r7:82804d40 r6:dddced80 r5:dddceda0 r4:856d5400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856d5400 r8:80287e08 r7:ec985e60 r6:85716200 r5:85920c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec995fb0 to 0xec995ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:856c8f00 INFO: task kworker/0:865:6070 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: ac787000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:866:6071 blocked for more than 474 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:866 state:D stack:0 pid:6071 tgid:6071 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecbd9d84 r8:00000002 r7:60000013 r6:ecbd9d8c r5:85921800 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8478fec0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85921800 r7:00000000 r6:83018000 r5:00001000 r4:7f07f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebcc3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85988b8c r4:85988800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85988b8c r4:856d5480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85921800 r8:856d54ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:856d5480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856d5480 r8:80287e08 r7:ec995e60 r6:85716280 r5:85921800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecbd9fb0 to 0xecbd9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:856c8f00 INFO: task kworker/0:866:6071 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: aca77000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:867:6074 blocked for more than 474 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:867 state:D stack:0 pid:6074 tgid:6074 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecbe1d84 r8:00000002 r7:60000113 r6:ecbe1d8c r5:85923000 r4:85923000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85923000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecbe1e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85727bc0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85923000 r7:00000000 r6:83018000 r5:00001000 r4:7f091000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8598af8c r4:8598ac00 r7:dddced80 r6:83018000 r5:8598af8c r4:856d5500 r4:856d5500 r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: ad07b000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:868:6076 blocked for more than 474 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:868 state:D stack:0 pid:6076 tgid:6076 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecbe9d84 r8:00000002 r7:60000113 r6:ecbe9d8c r5:85922400 r4:85922400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85922400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecbe9e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85727280 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85922400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec50d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8598938c r4:85989000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8598938c r4:856d5580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85922400 r8:856d55ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:856d5580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856d5580 r8:80287e08 r7:ecbe1e60 r6:85716380 r5:85922400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecbe9fb0 to 0xecbe9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85727100 INFO: task kworker/0:868:6076 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: ad07b000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 r5:800f0013 r4:80239bb0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:84be0b8c r4:84be0800 r4:84bb2000 r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:869:6077 blocked for more than 474 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:869 state:D stack:0 pid:6077 tgid:6077 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecbedd84 r8:00000002 r7:60000113 r6:ecbedd8c r5:85924800 r4:85924800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85924800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecbede08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85727400 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85924800 r7:00000000 r6:83018000 r5:00001000 r4:7f085000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec527000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8598978c r4:85989400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8598978c r4:856d5600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85924800 r8:856d562c r7:82804d40 r6:dddced80 r5:dddceda0 r4:856d5600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856d5600 r8:80287e08 r7:ecbe1e60 r6:85716400 r5:85924800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecbedfb0 to 0xecbedff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85727340 INFO: task kworker/0:869:6077 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: ad07b000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:870:6079 blocked for more than 474 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:870 state:D stack:0 pid:6079 tgid:6079 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecbf5d84 r8:00000002 r7:60000113 r6:ecbf5d8c r5:85923c00 r4:85923c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85923c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecbf5e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85727540 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85923c00 r7:00000000 r6:83018000 r5:00001000 r4:7f087000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec54b000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85989b8c r4:85989800 r7:dddced80 r6:83018000 r5:85989b8c r4:856d5680 r4:856d5680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856d5680 r8:80287e08 r7:ecbe1e60 r6:85716480 r5:85923c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecbf5fb0 to 0xecbf5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85727480 INFO: task kworker/0:870:6079 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: ad730000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:871:6081 blocked for more than 474 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Workqueue: events bpf_prog_free_deferred r5:85925400 r4:8291a680 [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r9:83018005 r8:85925400 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 r5:85989f8c r4:85989c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85989f8c r4:856d5700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85925400 r8:856d572c r7:82804d40 r6:dddced80 r5:dddceda0 r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe05c1d28 to 0xe05c1d70) 1d60: 80230ad0 80239bb0 800f0013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecc05d84 r8:00000002 r7:60000113 r6:ecc05d8c r5:85926000 r4:85926000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85926000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc05e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85727840 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85926000 r7:00000000 r6:83018000 r5:00001000 r4:7f08b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec58b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8598a38c r4:8598a000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8598a38c r4:856d5780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85926000 r8:856d57ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:856d5780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856d5780 r8:80287e08 r7:ecbe1e60 r6:85716580 r5:85926000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc05fb0 to 0xecc05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857274c0 INFO: task kworker/0:872:6083 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: ad730000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r4:00000000 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:8598a78c r4:856d5800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85926c00 r8:856d582c r7:82804d40 r6:dddced80 r5:dddceda0 r4:856d5800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856d5800 r8:80287e08 r7:ecbe1e60 r6:85716600 r5:85926c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc11fb0 to 0xecc11ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85727640 INFO: task kworker/0:873:6086 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: ae1c1000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 r4:82ac21e4 r4:00000000 r5:84be0b8c r4:84be0800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc19e08 r9:83018005 r8:85928c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 r5:8598ab8c r4:8598a800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:856d5880 r8:80287e08 r7:ecbe1e60 r6:85716680 r5:85928c00 task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r4:e05c1dc0 r5:00001000 r4:dfd53000 r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xe05c1fb0 to 0xe05c1ff8) INFO: task kworker/0:875:6089 blocked for more than 474 seconds. [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc1de08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85727c40 r5:8598bb8c r4:8598b800 r10:61c88647 r9:85929800 r8:856d592c r7:82804d40 r6:dddced80 r5:dddceda0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r5:800f0013 r4:80239bb0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r5:84be0b8c r4:84be0800 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:876:6091 blocked for more than 474 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:876 state:D stack:0 pid:6091 tgid:6091 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecc25d84 r8:00000002 r7:60000013 r6:ecc25d8c r5:85928000 r4:85928000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85928000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc25e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85727d40 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85928000 r7:00000000 r6:83018000 r5:00001000 r4:7f093000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec6bb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8598b38c r4:8598b000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8598b38c r4:856d5980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85928000 r8:856d59ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:856d5980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856d5980 r8:80287e08 r7:ecc1de60 r6:85716780 r5:85928000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc25fb0 to 0xecc25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85727a40 INFO: task kworker/0:876:6091 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: ae1c1000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred r5:8592a400 r4:8291a680 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85727e40 r5:8598b78c r4:8598b400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:856d5a00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856d5a00 r8:80287e08 r7:ecc1de60 r6:85716800 r5:8592a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc2dfb0 to 0xecc2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85727b40 INFO: task kworker/0:877:6093 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: ae617000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:878:6095 blocked for more than 474 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:878 state:D stack:0 pid:6095 tgid:6095 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecc35d84 r8:00000002 r7:60000013 r6:ecc35d8c r5:8592b000 r4:8592b000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8592b000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc35e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856c8940 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8592b000 r7:00000000 r6:83018000 r5:00001000 r4:7f099000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec837000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8598bf8c r4:8598bc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8598bf8c r4:856d5a80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8592b000 r8:856d5aac r7:82804d40 r6:dddced80 r5:dddceda0 r4:856d5a80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856d5a80 r8:80287e08 r7:ecc1de60 r6:85716880 r5:8592b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc35fb0 to 0xecc35ff8) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xe05c1d28 to 0xe05c1d70) r4:e05c1dc0 r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:84ba8980 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:8592d400 r7:00000000 r6:83018000 r5:00001000 r4:7f015000 r5:8598fb8c r4:8598f800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 1d60: 80230ad0 80239bb0 800f0013 ffffffff r4:e05c1dc0 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xe05c1fb0 to 0xe05c1ff8) r4:84ba8980 Workqueue: events bpf_prog_free_deferred r5:8592c800 r4:8291a680 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8592c800 r7:00000000 r6:83018000 r5:00001000 r4:7f09b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec89f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8598c38c r4:8598c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8598c38c r4:856d5b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8592c800 r8:856d5bac r7:82804d40 r6:dddced80 r5:dddceda0 r4:856d5b80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856d5b80 r8:80287e08 r7:ecc3de60 r6:85716980 r5:8592c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc45fb0 to 0xecc45ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:856c8000 INFO: task kworker/0:880:6099 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: aee57000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:881:6101 blocked for more than 474 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:881 state:D stack:0 pid:6101 tgid:6101 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r4:8592e000 [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:8598c78c r4:856d5c00 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:882:6103 blocked for more than 474 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:882 state:D stack:0 pid:6103 tgid:6103 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecc55d84 r8:00000002 r7:60000013 r6:ecc55d8c r5:8592bc00 r4:8592bc00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8592bc00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc55e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857c0440 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8592bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a1000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8c9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8598cb8c r4:8598c800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8598cb8c r4:856d5c80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8592bc00 r8:856d5cac r7:82804d40 r6:dddced80 r5:dddceda0 r4:856d5c80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856d5c80 r8:80287e08 r7:ecc3de60 r6:85716a80 r5:8592bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc55fb0 to 0xecc55ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857c01c0 INFO: task kworker/0:882:6103 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: af37e000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:883:6105 blocked for more than 474 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:883 state:D stack:0 pid:6105 tgid:6105 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r4:859d3000 [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:859d3000 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 r5:8598cf8c r4:8598cc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:859d3000 r8:856d5d2c r7:82804d40 r6:dddced80 r5:dddceda0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe05c1d28 to 0xe05c1d70) r4:82ac21e4 r4:e05c1dc0 r5:00001000 r4:dfd53000 r5:84be0b8c r4:84be0800 r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:84ba8980 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc65e08 r9:83018005 r8:85930c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a5000 r5:8598d38c r4:8598d000 r10:61c88647 r9:85930c00 r8:856d5dac r7:82804d40 r6:dddced80 r5:dddceda0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857c0400 INFO: task kworker/0:884:6107 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: af7da000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:885:6109 blocked for more than 474 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:885 state:D stack:0 pid:6109 tgid:6109 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecc6dd84 r8:00000002 r7:60000013 r6:ecc6dd8c r5:85932400 r4:85932400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85932400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc6de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857c07c0 r5:8598d78c r4:8598d400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8598d78c r4:856d5e00 r4:856d5e00 Exception stack(0xecc6dfb0 to 0xecc6dff8) task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 1d60: 80230ad0 80239bb0 800f0013 ffffffff r4:e05c1dc0 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 INFO: task kworker/0:886:6111 blocked for more than 474 seconds. r4:85931800 [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:8598db8c r4:8598d800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8598db8c r4:856d5e80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85931800 r8:856d5eac r7:82804d40 r6:dddced80 r5:dddceda0 r4:856d5e80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856d5e80 r8:80287e08 r7:ecc3de60 r6:85716c80 r5:85931800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc75fb0 to 0xecc75ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857c0640 INFO: task kworker/0:886:6111 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: afbbe000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred r5:85933c00 r4:8291a680 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857c0a80 r5:8598df8c r4:8598dc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:856d5f00 Exception stack(0xecc7dfb0 to 0xecc7dff8) task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:800f0013 r4:80239bb0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r5:84be0b8c r4:84be0800 r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:84ba8980 Workqueue: events bpf_prog_free_deferred [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:ec97b000 r5:8598e38c r4:8598e000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xecc85fb0 to 0xecc85ff8) INFO: task kworker/0:888:6115 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: afff5000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:889:6117 blocked for more than 474 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:889 state:D stack:0 pid:6117 tgid:6117 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecc8dd84 r8:00000002 r7:60000013 r6:ecc8dd8c r5:85935400 r4:85935400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85935400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc8de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857c0cc0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85935400 r7:00000000 r6:83018000 r5:00001000 r4:7f0af000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec997000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8598e78c r4:8598e400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85935400 r8:857dd02c r7:82804d40 r6:dddced80 r5:dddceda0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r5:84be0b8c r4:84be0800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc95e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857c0e00 r5:8598eb8c r4:8598e800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xecc95fb0 to 0xecc95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857c0ac0 INFO: task kworker/0:890:6119 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: b0aa9000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:891:6121 blocked for more than 474 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:891 state:D stack:0 pid:6121 tgid:6121 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecc9dd84 r8:00000002 r7:60000013 r6:ecc9dd8c r5:85936c00 r4:85936c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85936c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc9de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857c0f40 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85936c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0b3000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec9b7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8598ef8c r4:8598ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8598ef8c r4:857dd100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85936c00 r8:857dd12c r7:82804d40 r6:dddced80 r5:dddceda0 r4:857dd100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xecc9dfb0 to 0xecc9dff8) task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 1fa0: 00000000 00000000 00000000 00000000 [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eccb1d84 r8:00000002 r7:60000113 r6:eccb1d8c r5:85936000 r4:85936000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85936000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eccb1e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85717d80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85936000 r7:00000000 r6:83018000 r5:00001000 r4:7f0b5000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecca3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8598f38c r4:8598f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8598f38c r4:857dd180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85936000 r8:857dd1ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:857dd180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857dd180 r8:80287e08 r7:ecc3de60 r6:85716f80 r5:85936000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeccb1fb0 to 0xeccb1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85717e40 INFO: task kworker/0:892:6124 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 Exception stack(0xe05c1d28 to 0xe05c1d70) r4:82ac21e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r5:84be0b8c r4:84be0800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:85933000 r4:8291a680 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8598f78c r4:8598f400 r4:857dd200 Exception stack(0xeccbdfb0 to 0xeccbdff8) task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 1d20: b1232000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings task:kworker/0:894 state:D stack:0 pid:6128 tgid:6128 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8599038c r4:85990000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8599038c r4:857dd280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85938000 r8:857dd2ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:857dd280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857dd280 r8:80287e08 r7:ecc3de60 r6:857f6080 r5:85938000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca1dfb0 to 0xeca1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857f2100 INFO: task kworker/0:894:6128 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: b155a000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:84ba8980 [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca21e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857f2100 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85938c00 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab8d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8598ff8c r4:8598fc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8598ff8c r4:857dd300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85938c00 r8:857dd32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:857dd300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857dd300 r8:80287e08 r7:eca1de60 r6:857f6100 r5:85938c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca21fb0 to 0xeca21ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857f2100 INFO: task kworker/0:895:6129 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r5:800f0013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 Exception stack(0xe05c1fb0 to 0xe05c1ff8) INFO: task kworker/0:896:6133 blocked for more than 474 seconds. r4:85939800 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eccade08 r9:83018005 r8:85939800 r7:00000000 r6:83018000 r5:00001000 r4:7f031000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 r4:82ac21e4 r4:00000000 r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:897:6134 blocked for more than 474 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:897 state:D stack:0 pid:6134 tgid:6134 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eca29d84 r8:00000002 r7:60000113 r6:eca29d8c r5:8593a400 r4:8593a400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8593a400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca29e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857f2680 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8593a400 r7:00000000 r6:83018000 r5:00001000 r4:7f02f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5d1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8599078c r4:85990400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8599078c r4:857dd400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8593a400 r8:857dd42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:857dd400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857dd400 r8:80287e08 r7:eccade60 r6:857f6200 r5:8593a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca29fb0 to 0xeca29ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857f22c0 INFO: task kworker/0:897:6134 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: b18ff000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 Exception stack(0xe05c1fb0 to 0xe05c1ff8) r4:84ba8980 Workqueue: events bpf_prog_free_deferred r4:8593b000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca69e08 r9:83018005 r8:8593b000 r7:00000000 r6:83018000 r5:00001000 r4:7f043000 r5:85992f8c r4:85992c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857f2580 INFO: task kworker/0:898:6137 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: b1ca5000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857f28c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8593c800 r7:00000000 r6:83018000 r5:00001000 r4:7f033000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8f1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85990f8c r4:85990c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85990f8c r4:857dd500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8593c800 r8:857dd52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:857dd500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857dd500 r8:80287e08 r7:eca69e60 r6:857f6300 r5:8593c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca71fb0 to 0xeca71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857f2580 INFO: task kworker/0:899:6138 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d60: 80230ad0 80239bb0 800f0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r5:84be0b8c r4:84be0800 r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:eb943000 r5:8599138c r4:85991000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:8593bc00 r8:857dd5ac r7:82804d40 r6:dddced80 r5:dddceda0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 1d60: 80230ad0 80239bb0 800f0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:901:6142 blocked for more than 474 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:901 state:D stack:0 pid:6142 tgid:6142 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecb2dd84 r8:00000002 r7:60000113 r6:ecb2dd8c r5:8593d400 r4:8593d400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8593d400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb2de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857f2b40 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8593d400 r7:00000000 r6:83018000 r5:00001000 r4:7f037000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb9d1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8599178c r4:85991400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8599178c r4:857dd600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8593d400 r8:857dd62c r7:82804d40 r6:dddced80 r5:dddceda0 r4:857dd600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857dd600 r8:80287e08 r7:eca69e60 r6:857f6400 r5:8593d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb2dfb0 to 0xecb2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857f2700 INFO: task kworker/0:901:6142 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: b1ca5000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:902:6144 blocked for more than 474 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:902 state:D stack:0 pid:6144 tgid:6144 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eccc1d84 r8:00000002 r7:60000113 r6:eccc1d8c r5:8593e000 r4:8593e000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8593e000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eccc1e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857f2e40 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8593e000 r7:00000000 r6:83018000 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebafb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85991f8c r4:85991c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85991f8c r4:857dd680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8593e000 r8:857dd6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:857dd680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857dd680 r8:80287e08 r7:eca69e60 r6:857f6480 r5:8593e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeccc1fb0 to 0xeccc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857f2940 INFO: task kworker/0:902:6144 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: b2359000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:903:6147 blocked for more than 474 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:903 state:D stack:0 pid:6147 tgid:6147 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eccc9d84 r8:00000002 r7:60000113 r6:eccc9d8c r5:84891800 r4:84891800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84891800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eccc9e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857f2f80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84891800 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb51000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8599238c r4:85992000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8599238c r4:857dd700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84891800 r8:857dd72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:857dd700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857dd700 r8:80287e08 r7:eca69e60 r6:857f6500 r5:84891800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeccc9fb0 to 0xeccc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857f2940 INFO: task kworker/0:903:6147 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: b2359000 dfb47000 00000001 80239b98 7f2fb000 00000001 r4:82ac21e4 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-rc7-syzkaller #0 r4:84890c00 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857f2b80 r5:8599278c r4:85992400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8599278c r4:857dd780 r10:61c88647 r9:84890c00 r8:857dd7ac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 INFO: task kworker/0:905:6151 blocked for more than 474 seconds. Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec979d84 r8:00000002 r7:60000113 r6:ec979d8c r5:8592ec00 r4:8592ec00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8592ec00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec979e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8478fe00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8592ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f041000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebbd5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85992b8c r4:85992800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85992b8c r4:857dd800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8592ec00 r8:857dd82c r7:82804d40 r6:dddced80 r5:dddceda0 r4:857dd800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857dd800 r8:80287e08 r7:eca69e60 r6:857dd880 r5:8592ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec979fb0 to 0xec979ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857f2f40 INFO: task kworker/0:905:6151 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: b2814000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:84ba8980 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857c9cc0 r5:8599338c r4:85993000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Call trace: Exception stack(0xe05c1d28 to 0xe05c1d70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 Exception stack(0xe05c1fb0 to 0xe05c1ff8) INFO: task kworker/0:907:6155 blocked for more than 474 seconds. r4:85916000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85916000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec959e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85810280 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85916000 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec685000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85993b8c r4:85993800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85993b8c r4:857dda80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85916000 r8:857ddaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:857dda80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857dda80 r8:80287e08 r7:eccd5e60 r6:857ddb00 r5:85916000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec959fb0 to 0xec959ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857c9cc0 INFO: task kworker/0:907:6155 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: b2a58000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8599378c r4:85993400 r10:61c88647 r9:8591e000 r8:857dda2c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:82ac21e4 r4:e05c1dc0 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:909:6160 blocked for more than 474 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:909 state:D stack:0 pid:6160 tgid:6160 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecce1d84 r8:00000002 r7:60000013 r6:ecce1d8c r5:8504e000 r4:8504e000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8504e000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecce1e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858107c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8504e000 r7:00000000 r6:83018000 r5:00001000 r4:7f04f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec88d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8599878c r4:85998400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8599878c r4:857ddc00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8504e000 r8:857ddc2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:857ddc00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857ddc00 r8:80287e08 r7:ec959e60 r6:857ddc80 r5:8504e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecce1fb0 to 0xecce1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85810140 INFO: task kworker/0:909:6160 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: b2de1000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 task:kworker/0:910 state:D stack:0 pid:6161 tgid:6161 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:859e0000 r4:8291a680 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecce5e08 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85810540 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:859e0000 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec7a3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85993f8c r4:85993c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85993f8c r4:857ddd00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:859e0000 r8:857ddd2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:857ddd00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857ddd00 r8:80287e08 r7:ecce1e60 r6:857ddd80 r5:859e0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecce5fb0 to 0xecce5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85810140 INFO: task kworker/0:910:6161 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: b3038000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 r4:84ba8980 Not tainted 6.15.0-rc7-syzkaller #0 [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8599b78c r4:8599b400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:859e0c00 r8:857f662c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:857f6600 r8:80287e08 r7:ec955e60 r6:857dde00 r5:859e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeccedfb0 to 0xeccedff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857f89c0 INFO: task kworker/1:600:6162 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: b339c000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:911:6165 blocked for more than 475 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:911 state:D stack:0 pid:6165 tgid:6165 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecce9d84 r8:00000002 r7:60000113 r6:ecce9d8c r5:859e1800 r4:859e1800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:859e1800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecce9e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85810680 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:859e1800 r7:00000000 r6:83018000 r5:00001000 r4:7f04d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec7bd000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8599838c r4:85998000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8599838c r4:857dde80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:859e1800 r8:857ddeac r7:82804d40 r6:dddced80 r5:dddceda0 r4:857dde80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857dde80 r8:80287e08 r7:ecce1e60 r6:857ddf00 r5:859e1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecce9fb0 to 0xecce9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:858103c0 INFO: task kworker/0:911:6165 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: b339c000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:912:6167 blocked for more than 475 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:912 state:D stack:0 pid:6167 tgid:6167 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eccf5d84 r8:00000002 r7:60000113 r6:eccf5d8c r5:859e2400 r4:859e2400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:859e2400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eccf5e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85810900 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:859e2400 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec9c5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85998b8c r4:85998800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85998b8c r4:857ddf80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:859e2400 r8:857ddfac r7:82804d40 r6:dddced80 r5:dddceda0 r4:857ddf80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857ddf80 r8:80287e08 r7:ecce1e60 r6:85824000 r5:859e2400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeccf5fb0 to 0xeccf5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85810640 INFO: task kworker/0:912:6167 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: b33fa000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:913:6169 blocked for more than 475 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:913 state:D stack:0 pid:6169 tgid:6169 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eccf9d84 r8:00000002 r7:60000113 r6:eccf9d8c r5:859e3000 r4:859e3000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:859e3000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eccf9e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85810d80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:859e3000 r7:00000000 r6:83018000 r5:00001000 r4:7f057000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca15000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8599978c r4:85999400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8599978c r4:85824080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:859e3000 r8:858240ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85824080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85824080 r8:80287e08 r7:eccf5e60 r6:85824100 r5:859e3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeccf9fb0 to 0xeccf9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85810780 task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 1d60: 80230ad0 80239bb0 800f0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:84bb2000 Exception stack(0xe05c1fb0 to 0xe05c1ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:914:6170 blocked for more than 475 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:914 state:D stack:0 pid:6170 tgid:6170 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eccfdd84 r8:00000002 r7:60000013 r6:eccfdd8c r5:859e3c00 r4:859e3c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:859e3c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eccfde08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85810780 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:859e3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec9e9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85998f8c r4:85998c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85998f8c r4:85824180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:859e3c00 r8:858241ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85824180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85824180 r8:80287e08 r7:eccf9e60 r6:85824200 r5:859e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeccfdfb0 to 0xeccfdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:858109c0 INFO: task kworker/0:914:6170 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: b3cbc000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:e05c1dc0 r5:00001000 r4:dfd53000 r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/0:915:6174 blocked for more than 475 seconds. r5:859e5400 r4:8291a680 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:859e5400 r8:858242ac r7:82804d40 r6:dddced80 r5:dddceda0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: b3cbc000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:916:6175 blocked for more than 475 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:916 state:D stack:0 pid:6175 tgid:6175 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:859e6000 r4:8291a680 r4:00000000 r4:00000000 r5:85999b8c r4:85999800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe05c1d28 to 0xe05c1d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:917:6177 blocked for more than 475 seconds. [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:8599a78c r4:8599a400 r7:dddced80 r6:83018000 r5:8599a78c r4:85824480 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Call trace: r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 Exception stack(0xe05c1fb0 to 0xe05c1ff8) Not tainted 6.15.0-rc7-syzkaller #0 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd0de08 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:859e8000 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca5d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85999f8c r4:85999c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85999f8c r4:85824580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:859e8000 r8:858245ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85824580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85824580 r8:80287e08 r7:ecd09e60 r6:85824600 r5:859e8000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd0dfb0 to 0xecd0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8582c140 INFO: task kworker/0:918:6178 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: b4279000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 r5:00001000 r4:dfd53000 r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:85824680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85824680 r8:80287e08 r7:ecd09e60 r6:85824700 r5:859e8c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd01fb0 to 0xecd01ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8582c300 INFO: task kworker/0:919:6181 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: b4279000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) r4:84ba8980 [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd15e08 r9:83018005 r8:859e9800 r7:00000000 r6:83018000 r5:00001000 r4:7f061000 r5:8599ab8c r4:8599a800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:85824780 r8:80287e08 r7:ecd09e60 r6:85824800 r5:859e9800 INFO: task kworker/0:920:6183 is blocked on a mutex likely owned by task kworker/1:204:3660. r5:800f0013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 Exception stack(0xe05c1fb0 to 0xe05c1ff8) Not tainted 6.15.0-rc7-syzkaller #0 r5:859eb000 r4:8291a680 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:8599af8c r4:8599ac00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: b47f3000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:922:6186 blocked for more than 475 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:922 state:D stack:0 pid:6186 tgid:6186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecd1dd84 r8:00000002 r7:60000113 r6:ecd1dd8c r5:859ebc00 r4:859ebc00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:859ebc00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd1de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8582c6c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:859ebc00 r7:00000000 r6:83018000 r5:00001000 r4:7f0bf000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8599bf8c r4:8599bc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:85824980 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r5:84be0b8c r4:84be0800 r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:84ba8980 Workqueue: events bpf_prog_free_deferred [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:85824a80 r8:80287e08 r7:ecd1de60 r6:85824b00 r5:859ed400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd21fb0 to 0xecd21ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8582c980 INFO: task kworker/0:923:6189 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: b4c8a000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:924:6190 blocked for more than 475 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:924 state:D stack:0 pid:6190 tgid:6190 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:84893c00 r4:8291a680 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8599bb8c r4:8599b800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:85824b80 r8:80287e08 r7:ecd1de60 r6:857f6680 r5:84893c00 INFO: task kworker/0:924:6190 is blocked on a mutex likely owned by task kworker/1:204:3660. 1d20: b50e0000 dfb47000 00000001 80239b98 7f2fb000 00000001 r4:e05c1dc0 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f0c1000 r5:859a438c r4:859a4000 r10:61c88647 r9:84894800 r8:85824c2c r7:82804d40 r6:dddced80 r5:dddceda0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:82ac21e4 r4:00000000 r5:84be0b8c r4:84be0800 r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:926:6196 blocked for more than 475 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:926 state:D stack:0 pid:6196 tgid:6196 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecd29d84 r8:00000002 r7:60000113 r6:ecd29d8c r5:859ec800 r4:859ec800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:859ec800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd29e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858370c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:859ec800 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfae3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859a478c r4:859a4400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:859a478c r4:85824c80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:859ec800 r8:85824cac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85824c80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85824c80 r8:80287e08 r7:ecd19e60 r6:85824d00 r5:859ec800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd29fb0 to 0xecd29ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85837000 INFO: task kworker/0:926:6196 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: b50e0000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:84ba8980 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:859a4b8c r4:859a4800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:859a4b8c r4:85824d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:859eec00 r8:85824dac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85824d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85824d80 r8:80287e08 r7:ecd29e60 r6:85824e00 r5:859eec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd2dfb0 to 0xecd2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85837240 INFO: task kworker/0:927:6198 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: b55a6000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:928:6201 blocked for more than 475 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:928 state:D stack:0 pid:6201 tgid:6201 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eba39d84 r8:00000002 r7:60000113 r6:eba39d8c r5:859ee000 r4:859ee000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:859ee000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba39e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858374c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:859ee000 r7:00000000 r6:83018000 r5:00001000 r4:7f065000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaddd000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859a4f8c r4:859a4c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:859a4f8c r4:85824e80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:859ee000 r8:85824eac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85824e80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85824e80 r8:80287e08 r7:ecd2de60 r6:85824f00 r5:859ee000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba39fb0 to 0xeba39ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/0:928:6201 is blocked on a mutex likely owned by task kworker/1:204:3660. Call trace: Exception stack(0xe05c1d28 to 0xe05c1d70) 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:929:6202 blocked for more than 475 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:929 state:D stack:0 pid:6202 tgid:6202 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec945d84 r8:00000002 r7:60000013 r6:ec945d8c r5:859ea400 r4:859ea400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:859ea400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec945e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85837840 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:859ea400 r7:00000000 r6:83018000 r5:00001000 r4:7f069000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb57b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859a578c r4:859a5400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:859a578c r4:85824f80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:859ea400 r8:85824fac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85824f80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85824f80 r8:80287e08 r7:eba39e60 r6:844dc000 r5:859ea400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec945fb0 to 0xec945ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85837340 INFO: task kworker/0:929:6202 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: b5ac4000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:930:6203 blocked for more than 475 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:930 state:D stack:0 pid:6203 tgid:6203 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecbcdd84 r8:00000002 r7:60000013 r6:ecbcdd8c r5:859f0000 r4:859f0000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:859f0000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecbcde08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85837680 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:859f0000 r7:00000000 r6:83018000 r5:00001000 r4:7f067000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb469000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859a538c r4:859a5000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:859a538c r4:844dc080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:859f0000 r8:844dc0ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:844dc080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:844dc080 r8:80287e08 r7:ec945e60 r6:844dc100 r5:859f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecbcdfb0 to 0xecbcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:858375c0 INFO: task kworker/0:930:6203 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: b5ac4000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:931:6206 blocked for more than 475 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:931 state:D stack:0 pid:6206 tgid:6206 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecc01d84 r8:00000002 r7:60000113 r6:ecc01d8c r5:859f1800 r4:859f1800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:859f1800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc01e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85837d40 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:859f1800 r7:00000000 r6:83018000 r5:00001000 r4:7f06f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba4d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859a5f8c r4:859a5c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:859a5f8c r4:844dc180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:859f1800 r8:844dc1ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:844dc180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:844dc180 r8:80287e08 r7:ec945e60 r6:844dc200 r5:859f1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc01fb0 to 0xecc01ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:858376c0 INFO: task kworker/0:931:6206 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: b5ac4000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:932:6208 blocked for more than 475 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:932 state:D stack:0 pid:6208 tgid:6208 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecc79d84 r8:00000002 r7:60000113 r6:ecc79d8c r5:859f3000 r4:859f3000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:859f3000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc79e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85837c40 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:859f3000 r7:00000000 r6:83018000 r5:00001000 r4:7f06d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb899000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859a5b8c r4:859a5800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:859a5b8c r4:844dc280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:859f3000 r8:844dc2ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:844dc280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:844dc280 r8:80287e08 r7:ecc01e60 r6:844dc300 r5:859f3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc79fb0 to 0xecc79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85837980 INFO: task kworker/0:932:6208 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: b5ac4000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:601:6210 blocked for more than 475 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:601 state:D stack:0 pid:6210 tgid:6210 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecc09d84 r8:00000002 r7:60000113 r6:ecc09d8c r5:859f0c00 r4:859f0c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:859f0c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc09e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bc1c40 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:859f0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f08d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec89d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859b1b8c r4:859b1800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:859b1b8c r4:857f6780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:859f0c00 r8:857f67ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857f6780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857f6780 r8:80287e08 r7:ec955e60 r6:844dc380 r5:859f0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc09fb0 to 0xecc09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857f8fc0 INFO: task kworker/1:601:6210 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: b618e000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecbf9e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85837e80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:859f3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f071000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba91000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859a638c r4:859a6000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:859a638c r4:844dc400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:859f3c00 r8:844dc42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:844dc400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:844dc400 r8:80287e08 r7:ecc01e60 r6:844dc480 r5:859f3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecbf9fb0 to 0xecbf9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85837b40 INFO: task kworker/0:933:6212 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: b618e000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8291a684 r9:ecc99d84 r8:00000002 r7:60000013 r6:ecc99d8c r5:859f4800 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc99e08 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:859a6b8c r4:859a6800 r10:61c88647 r9:859f4800 r8:844dc52c r7:82804d40 r6:dddced80 r5:dddceda0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xe05c1fb0 to 0xe05c1ff8) INFO: task kworker/0:935:6216 blocked for more than 475 seconds. r4:859f5400 r4:00000000 r4:00000000 r5:00001000 r4:ebc1b000 r5:859a678c r4:859a6400 r7:dddced80 r6:83018000 r5:859a678c r4:844dc600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:859f5400 r8:844dc62c r7:82804d40 r6:dddced80 r5:dddceda0 r4:844dc600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:844dc600 r8:80287e08 r7:ecc99e60 r6:844dc680 r5:859f5400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecca9fb0 to 0xecca9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8582cf80 INFO: task kworker/0:935:6216 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: b695d000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:936:6218 blocked for more than 475 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:936 state:D stack:0 pid:6218 tgid:6218 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eccb9d84 r8:00000002 r7:60000113 r6:eccb9d8c r5:859f6000 r4:859f6000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:859f6000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eccb9e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:859a6f8c r4:859a6c00 r7:dddced80 r6:83018000 r5:859a6f8c r4:844dc700 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 1d60: 80230ad0 80239bb0 800f0013 ffffffff r4:00000000 r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 Exception stack(0xe05c1fb0 to 0xe05c1ff8) INFO: task kworker/0:937:6221 blocked for more than 475 seconds. r5:859f6c00 r4:8291a680 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859a738c r4:859a7000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:859a738c r4:844dc800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:859f6c00 r8:844dc82c r7:82804d40 r6:dddced80 r5:dddceda0 r4:844dc800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:844dc800 r8:80287e08 r7:eccb9e60 r6:844dc880 r5:859f6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd31fb0 to 0xecd31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84a431c0 INFO: task kworker/0:937:6221 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: b6b7b000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:938:6222 blocked for more than 475 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:938 state:D stack:0 pid:6222 tgid:6222 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecd35d84 r8:00000002 r7:60000113 r6:ecd35d8c r5:859f2400 r4:859f2400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:859f2400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd35e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a43480 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:859f2400 r7:00000000 r6:83018000 r5:00001000 r4:7f07b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec51b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859a778c r4:859a7400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:859a778c r4:844dc900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:859f2400 r8:844dc92c r7:82804d40 r6:dddced80 r5:dddceda0 r4:844dc900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:844dc900 r8:80287e08 r7:ecd31e60 r6:844dc980 r5:859f2400 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe05c1d28 to 0xe05c1d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:939:6224 blocked for more than 475 seconds. Workqueue: events bpf_prog_free_deferred [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:859a7b8c r4:859a7800 Exception stack(0xecd39fb0 to 0xecd39ff8) Exception stack(0xe05c1d28 to 0xe05c1d70) r5:00001000 r4:dfd53000 Exception stack(0xe05c1fb0 to 0xe05c1ff8) r10:8291a684 r9:ecd3dd84 r8:00000002 r7:60000113 r6:ecd3dd8c r5:85128c00 r5:859a7f8c r4:859a7c00 r4:844dcb00 task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:00001000 r4:dfd53000 Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:941:6228 blocked for more than 475 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:941 state:D stack:0 pid:6228 tgid:6228 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecd41d84 r8:00000002 r7:60000013 r6:ecd41d8c r5:85129800 r4:85129800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85129800 r4:8291a680 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd41e08 r5:859b038c r4:859b0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:859b038c r4:844dcc00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85129800 r8:844dcc2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:844dcc00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:844dcc00 r8:80287e08 r7:ecd3de60 r6:844dcc80 r5:85129800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd41fb0 to 0xecd41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:84be0b8c r4:84be0800 Exception stack(0xe05c1fb0 to 0xe05c1ff8) r4:8512a400 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:859b078c r4:859b0400 Exception stack(0xecd45fb0 to 0xecd45ff8) r4:00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:943:6232 blocked for more than 475 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:943 state:D stack:0 pid:6232 tgid:6232 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecd49d84 r8:00000002 r7:60000113 r6:ecd49d8c r5:8512b000 r4:8512b000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8512b000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd49e08 r4:00000000 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:859b138c r4:859b1000 9fa0: 00000000 00000000 00000000 00000000 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:84bb2000 r4:84ba8980 [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:859b0b8c r4:859b0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:859b0b8c r4:844dcf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8512bc00 r8:844dcf2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:844dcf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:844dcf00 r8:80287e08 r7:ecd49e60 r6:844dcf80 r5:8512bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd4dfb0 to 0xecd4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84a43a40 INFO: task kworker/0:944:6234 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: b7fe1000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:945:6236 blocked for more than 475 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:945 state:D stack:0 pid:6236 tgid:6236 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecd51d84 r8:00000002 r7:60000113 r6:ecd51d8c r5:8512c800 r4:8512c800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8512c800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd51e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a43d80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8512c800 r7:00000000 r6:83018000 r5:00001000 r4:7f087000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec6d3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859b0f8c r4:859b0c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:859b0f8c r4:8481c000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8512c800 r8:8481c02c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8481c000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8481c000 r8:80287e08 r7:ecd49e60 r6:8481c080 r5:8512c800 Exception stack(0xecd51fb0 to 0xecd51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84a43c40 INFO: task kworker/0:945:6236 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: b8308000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:946:6238 blocked for more than 475 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:946 state:D stack:0 pid:6238 tgid:6238 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecd55d84 r8:00000002 r7:60000013 r6:ecd55d8c r5:8512d400 r4:8512d400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8512d400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd55e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8480c240 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8512d400 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8b5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859b1f8c r4:859b1c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:859b1f8c r4:8481c100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8512d400 r8:8481c12c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8481c100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8481c100 r8:80287e08 r7:ecd49e60 r6:8481c180 r5:8512d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd55fb0 to 0xecd55ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84a43d40 INFO: task kworker/0:946:6238 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: b86a1000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:e05c1dc0 r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ec839000 r5:859b178c r4:859b1400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8512e000 r8:8481c22c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8481c200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8481c200 r8:80287e08 r7:ecd55e60 r6:8481c280 r5:8512e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd59fb0 to 0xecd59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84a43d40 INFO: task kworker/0:947:6240 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: b86a1000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:602:6243 blocked for more than 475 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:602 state:D stack:0 pid:6243 tgid:6243 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecd5dd84 r8:00000002 r7:60000113 r6:ecd5dd8c r5:8512ec00 r4:8512ec00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8512ec00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd5de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84807e00 r5:8595738c r4:85957000 r7:ddde2d80 r6:83018200 r5:8595738c r4:857f6800 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xe05c1d28 to 0xe05c1d70) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:948 state:D stack:0 pid:6244 tgid:6244 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecd65d84 r8:00000002 r7:60000013 r6:ecd65d8c r5:85a10000 r4:85a10000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85a10000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd65e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8480c3c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85a10000 r7:00000000 r6:83018000 r5:00001000 r4:7f091000 r5:859b238c r4:859b2000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85a10000 r8:8481c3ac r7:82804d40 r6:dddced80 r5:dddceda0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ec8eb000 r5:859b278c r4:859b2400 r7:dddced80 r6:83018000 r5:859b278c r4:8481c500 r10:00000000 r9:8481c500 r8:80287e08 r7:ecd65e60 r6:8481c580 r5:85a10c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd61fb0 to 0xecd61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8480c580 INFO: task kworker/0:949:6246 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: b8d9e000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:85a11800 r4:8291a680 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:859b2b8c r4:859b2800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 r4:84bb2000 Exception stack(0xe05c1fb0 to 0xe05c1ff8) INFO: task kworker/0:951:6250 blocked for more than 475 seconds. r5:85a12400 r4:8291a680 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859b2f8c r4:859b2c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:859b2f8c r4:8481c680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85a12400 r8:8481c6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8481c680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8481c680 r8:80287e08 r7:ecd69e60 r6:8481c700 r5:85a12400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd6dfb0 to 0xecd6dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8480c640 INFO: task kworker/0:951:6250 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: b8fc1000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:859b378c r4:859b3400 r10:61c88647 r9:85a13000 r8:8481c7ac r7:82804d40 r6:dddced80 r5:dddceda0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8480c6c0 INFO: task kworker/0:952:6252 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: b938c000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:953:6254 blocked for more than 475 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:953 state:D stack:0 pid:6254 tgid:6254 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecd75d84 r8:00000002 r7:60000113 r6:ecd75d8c r5:85a13c00 r4:85a13c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85a13c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd75e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8480ca80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85a13c00 r7:00000000 r6:83018000 r5:00001000 r4:7f099000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec967000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859b338c r4:859b3000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:859b338c r4:8481c900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85a13c00 r8:8481c92c r7:82804d40 r6:dddced80 r5:dddceda0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:85a14800 r4:8291a680 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r9:83018005 r8:85a14800 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec999000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859b3b8c r4:859b3800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:859b3b8c r4:8481c880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85a14800 r8:8481c8ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8481c880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8481c880 r8:80287e08 r7:ecd71e60 r6:8481ca00 r5:85a14800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd79fb0 to 0xecd79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8480ca40 INFO: task kworker/0:954:6256 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: b991b000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85a2c78c r4:85a2c400 r10:61c88647 r9:85a15400 r8:8481caac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8481ca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8481ca80 r8:80287e08 r7:ecd79e60 r6:8481cb00 r5:85a15400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd7dfb0 to 0xecd7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8480cc00 INFO: task kworker/0:955:6259 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: b9b32000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xe05c1fb0 to 0xe05c1ff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:85a16000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd81e08 r5:00001000 r4:ec9a9000 r5:859b3f8c r4:859b3c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85a16000 r8:8481cbac r7:82804d40 r6:dddced80 r5:dddceda0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r4:82ac21e4 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecd85d84 r8:00000002 r7:60000013 r6:ecd85d8c r5:85a16c00 r4:85a16c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85a16c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd85e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84792040 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85a16c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a2c38c r4:85a2c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a2c38c r4:8481cc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85a16c00 r8:8481ccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8481cc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8481cc80 r8:80287e08 r7:ecd7de60 r6:8481cd00 r5:85a16c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd85fb0 to 0xecd85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84792240 INFO: task kworker/0:957:6262 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: ba1b6000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xe05c1fb0 to 0xe05c1ff8) Not tainted 6.15.0-rc7-syzkaller #0 r4:85a18000 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:85a2cb8c r4:85a2c800 r10:61c88647 r9:85a18000 r8:8481cdac r7:82804d40 r6:dddced80 r5:dddceda0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:959:6267 blocked for more than 475 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:959 state:D stack:0 pid:6267 tgid:6267 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecd91d84 r8:00000002 r7:60000013 r6:ecd91d8c r5:85a18c00 r4:85a18c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85a18c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd91e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84792640 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85a18c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a9000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb47000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a2cf8c r4:85a2cc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a2cf8c r4:8481ce80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85a18c00 r8:8481ceac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8481ce80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8481ce80 r8:80287e08 r7:ecd8de60 r6:8481cf00 r5:85a18c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd91fb0 to 0xecd91ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84792340 INFO: task kworker/0:959:6267 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: ba35b000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:960:6268 blocked for more than 475 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:960 state:D stack:0 pid:6268 tgid:6268 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecd95d84 r8:00000002 r7:60000013 r6:ecd95d8c r5:85a19800 r4:85a19800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:85a2d38c r4:85a2d000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a2d38c r4:8481cf80 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:82ac21e4 r4:00000000 r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 r5:84be0b8c r4:84be0800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85a2d78c r4:85a2d400 r4:847fa080 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:847926c0 INFO: task kworker/0:961:6270 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: baded000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:962:6273 blocked for more than 476 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:962 state:D stack:0 pid:6273 tgid:6273 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecd99d84 r8:00000002 r7:60000013 r6:ecd99d8c r5:85a1b000 r4:85a1b000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85a1b000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd99e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84792ac0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85a1b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0af000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb77000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a2db8c r4:85a2d800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a2db8c r4:847fa180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85a1b000 r8:847fa1ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:00000001 r4:84792840 Workqueue: events bpf_prog_free_deferred 1d20: bb2c4000 dfb47000 00000001 80239b98 7f2fb000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-rc7-syzkaller #0 r5:85a1bc00 r4:8291a680 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: bb2c4000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:964:6276 blocked for more than 476 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:964 state:D stack:0 pid:6276 tgid:6276 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecda5d84 r8:00000002 r7:60000113 r6:ecda5d8c r5:85a1c800 r4:85a1c800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85a1c800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecda5e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84792dc0 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85a2e38c r4:85a2e000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 1d60: 80230ad0 80239bb0 800f0013 ffffffff r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd9de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84792f80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85a1d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0b5000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecba7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a2e78c r4:85a2e400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a2e78c r4:847fa480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85a1d400 r8:847fa4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:847fa480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847fa480 r8:80287e08 r7:ecda5e60 r6:847fa500 r5:85a1d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd9dfb0 to 0xecd9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84792c40 INFO: task kworker/0:965:6278 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: bb710000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xe05c1fb0 to 0xe05c1ff8) r4:84ba8980 Call trace: [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 r5:85a2f38c r4:85a2f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:847fa580 Exception stack(0xecda9fb0 to 0xecda9ff8) task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:800f0013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 r5:85a2eb8c r4:85a2e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a2eb8c r4:847fa680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848b0000 r8:847fa6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:847fa680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847fa680 r8:80287e08 r7:ecda9e60 r6:847fa700 r5:848b0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecdb1fb0 to 0xecdb1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84792fc0 INFO: task kworker/0:967:6281 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: bbac4000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:968:6283 blocked for more than 476 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:968 state:D stack:0 pid:6283 tgid:6283 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecdb5d84 r8:00000002 r7:60000113 r6:ecdb5d8c r5:848b0c00 r4:848b0c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848b0c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecdb5e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847ee1c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:848b0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0c5000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecbc3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:847fa780 Exception stack(0xecdb5fb0 to 0xecdb5ff8) task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: bbac4000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-rc7-syzkaller #0 r5:848b1800 r4:8291a680 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:848b1800 r8:847fa8ac r7:82804d40 r6:dddced80 r5:dddceda0 dfa0: 00000000 00000000 00000000 00000000 [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:848b2400 r7:00000000 r6:83018000 r5:00001000 r4:7f0cb000 r7:dddced80 r6:83018000 r5:85a2fb8c r4:847fa980 r4:847fa980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847fa980 r8:80287e08 r7:ecdade60 r6:847faa00 r5:848b2400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecdbdfb0 to 0xecdbdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847ee200 INFO: task kworker/0:970:6289 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: bc6dc000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:971:6290 blocked for more than 476 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:971 state:D stack:0 pid:6290 tgid:6290 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecdc1d84 r8:00000002 r7:60000013 r6:ecdc1d8c r5:848b3000 r4:848b3000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848b3000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecdc1e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r9:83018005 r8:848b3000 r7:00000000 r6:83018000 r5:00001000 r4:7f0cd000 r7:dddced80 r6:83018000 r5:85a2ff8c r4:847faa80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847ee400 INFO: task kworker/0:971:6290 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: bc6dc000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 Exception stack(0xe05c1fb0 to 0xe05c1ff8) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r4:848b3c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848b3c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecdc5e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847ee880 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:848b3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0cf000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc39000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:85a3838c r4:847fab80 r4:847fab80 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 r4:00000000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:847fac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847fac80 r8:80287e08 r7:ecdc5e60 r6:847fad00 r5:848b4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecdc9fb0 to 0xecdc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847ee680 INFO: task kworker/0:973:6295 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: bc9f1000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xe05c1fb0 to 0xe05c1ff8) Not tainted 6.15.0-rc7-syzkaller #0 r10:8291a684 r9:ecdcdd84 r8:00000002 r7:60000013 r6:ecdcdd8c r5:848b5400 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r7:dddced80 r6:83018000 r5:85a3878c r4:847fad80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:847fad80 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred Exception stack(0xe05c1d28 to 0xe05c1d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-rc7-syzkaller #0 [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecdd1e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847eed00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:848b6000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc69000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a38f8c r4:85a38c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a38f8c r4:847fae80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848b6000 r8:847faeac r7:82804d40 r6:dddced80 r5:dddceda0 r4:847fae80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847fae80 r8:80287e08 r7:ecdc9e60 r6:847faf00 r5:848b6000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecdd1fb0 to 0xecdd1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847eea40 INFO: task kworker/0:975:6298 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: bd228000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:976 state:D stack:0 pid:6300 tgid:6300 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecdd5e08 r9:83018005 r8:848b6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f015000 r7:dddced80 r6:83018000 r5:85a3978c r4:847faf80 r4:847faf80 Exception stack(0xecdd5fb0 to 0xecdd5ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xe05c1d28 to 0xe05c1d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:977:6302 blocked for more than 476 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:977 state:D stack:0 pid:6302 tgid:6302 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecdd9d84 r8:00000002 r7:60000113 r6:ecdd9d8c r5:851f8000 r4:851f8000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:851f8000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecdd9e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847eeec0 r7:dddced80 r6:83018000 r5:85a3938c r4:85a6c080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xe05c1fb0 to 0xe05c1ff8) INFO: task kworker/0:978:6304 blocked for more than 476 seconds. [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a71640 r7:dddced80 r6:83018000 r5:85a39f8c r4:85a6c180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xecdb9fb0 to 0xecdb9ff8) r4:847eee80 Call trace: r4:00000000 1d60: 80230ad0 80239bb0 800f0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r5:84be0b8c r4:84be0800 r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:979:6305 blocked for more than 476 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:979 state:D stack:0 pid:6305 tgid:6305 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecde1d84 r8:00000002 r7:60000013 r6:ecde1d8c r5:851fa400 r4:851fa400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:851fa400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecde1e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a71540 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:851fa400 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1a5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a39b8c r4:85a39800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a39b8c r4:85a6c280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851fa400 r8:85a6c2ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85a6c280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a6c280 r8:80287e08 r7:ecdb9e60 r6:85a6c300 r5:851fa400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecde1fb0 to 0xecde1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a71040 INFO: task kworker/0:979:6305 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: bd86b000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xe05c1fb0 to 0xe05c1ff8) r4:84ba8980 Workqueue: events bpf_prog_free_deferred [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r9:83018005 r8:851fb000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000 r7:dddced80 r6:83018000 r5:85a3a38c r4:85a6c380 r10:00000000 r9:85a6c380 r8:80287e08 r7:ecdb9e60 r6:85a6c400 r5:851fb000 r4:85a71440 Call trace: 1d20: bd86b000 dfb47000 00000001 80239b98 7f2fb000 00000001 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:981:6312 blocked for more than 476 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:981 state:D stack:0 pid:6312 tgid:6312 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecdf1d84 r8:00000002 r7:60000013 r6:ecdf1d8c r5:851fc800 r4:851fc800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:851fc800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecdf1e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a71a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:851fc800 r7:00000000 r6:83018000 r5:00001000 r4:7f033000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb91d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3a78c r4:85a3a400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a3a78c r4:85a6c480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851fc800 r8:85a6c4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85a6c480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a6c480 r8:80287e08 r7:ecdede60 r6:85a6c500 r5:851fc800 Exception stack(0xecdf1fb0 to 0xecdf1ff8) task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:800f0013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 r4:00000001 Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:603:6313 blocked for more than 476 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:603 state:D stack:0 pid:6313 tgid:6313 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecde9d84 r8:00000002 r7:60000113 r6:ecde9d8c r5:851f8c00 r4:851f8c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:851f8c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecde9e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a71cc0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:851f8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb9a1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3ab8c r4:85a3a800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a3ab8c r4:857f6880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851f8c00 r8:857f68ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857f6880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:82ac21e4 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xe05c1fb0 to 0xe05c1ff8) r4:84ba8980 task:kworker/0:982 state:D stack:0 pid:6315 tgid:6315 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:85a3af8c r4:85a6c600 Exception stack(0xecdf9fb0 to 0xecdf9ff8) r4:85a71880 r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:82ac21e4 r4:00000000 r5:00001000 r4:dfd53000 r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 Exception stack(0xe05c1fb0 to 0xe05c1ff8) INFO: task kworker/1:604:6317 blocked for more than 476 seconds. r4:84895400 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecddde08 r9:83018205 r8:84895400 r7:00000000 r6:83018200 r5:00001000 r4:7f0b9000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecca5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8595778c r4:85957400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8595778c r4:857f6900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84895400 r8:857f692c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857f6900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857f6900 r8:80287e08 r7:ec955e60 r6:857f6980 r5:84895400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecdddfb0 to 0xecdddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84807c00 INFO: task kworker/1:604:6317 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: be003000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:84ba8980 Call trace: r5:84896c00 r4:8291a680 r4:00000000 r4:00000000 r5:85a3b38c r4:85a3b000 r7:dddced80 r6:83018000 r5:85a3b38c r4:85a6c700 r10:00000000 r9:85a6c700 r8:80287e08 r7:ecdf9e60 r6:857f6a00 r5:84896c00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xe05c1d28 to 0xe05c1d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:984:6321 blocked for more than 476 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:984 state:D stack:0 pid:6321 tgid:6321 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ece05d84 r8:00000002 r7:60000113 r6:ece05d8c r5:84893000 r4:84893000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84893000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece05e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a71200 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84893000 r7:00000000 r6:83018000 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb89000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3b78c r4:85a3b400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a3b78c r4:85a6c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84893000 r8:85a6c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85a6c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a6c780 r8:80287e08 r7:ecde5e60 r6:857f6a80 r5:84893000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xece05fb0 to 0xece05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a71e40 INFO: task kworker/0:984:6321 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 1d60: 80230ad0 80239bb0 800f0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:84bb2000 Exception stack(0xe05c1fb0 to 0xe05c1ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84892400 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r7:dddced80 r6:83018000 r5:85a3bb8c r4:85a6c800 r10:61c88647 r9:84892400 r8:85a6c82c r7:82804d40 r6:dddced80 r5:dddceda0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: bf1e8000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:986:6325 blocked for more than 476 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:986 state:D stack:0 pid:6325 tgid:6325 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ece15d84 r8:00000002 r7:60000113 r6:ece15d8c r5:85a1ec00 r4:85a1ec00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85a1ec00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece15e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a6f5c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85a1ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f043000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec68b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a4478c r4:85a44400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a4478c r4:85a6c880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85a1ec00 r8:85a6c8ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85a6c880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a6c880 r8:80287e08 r7:ece0de60 r6:857f6b80 r5:85a1ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xece15fb0 to 0xece15ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a6f000 INFO: task kworker/0:986:6325 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) r4:82ac21e4 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xe05c1fb0 to 0xe05c1ff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r5:84890000 r4:8291a680 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:85a6c900 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: bf4f3000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:988:6328 blocked for more than 476 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:988 state:D stack:0 pid:6328 tgid:6328 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r10:8291a684 r9:ece21d84 r8:00000002 r7:60000113 r6:ece21d8c r5:84896000 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:85a4438c r4:85a44000 r7:dddced80 r6:83018000 r5:85a4438c r4:85a6c980 r10:61c88647 r9:84896000 r8:85a6c9ac r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xece21fb0 to 0xece21ff8) task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r5:84be0b8c r4:84be0800 r4:84bb2000 Exception stack(0xe05c1fb0 to 0xe05c1ff8) INFO: task kworker/0:989:6331 blocked for more than 476 seconds. r4:85a08c00 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a6f300 r7:dddced80 r6:83018000 r5:85a44b8c r4:85a6ca00 r10:61c88647 r9:85a08c00 r8:85a6ca2c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:85a6ca00 r8:80287e08 r7:ece15e60 r6:857f6d00 r5:85a08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xece2dfb0 to 0xece2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a6f300 INFO: task kworker/0:989:6331 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: bfa48000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:990:6334 blocked for more than 476 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:990 state:D stack:0 pid:6334 tgid:6334 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ece39d84 r8:00000002 r7:60000113 r6:ece39d8c r5:85a08000 r4:85a08000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85a08000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece39e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a6f800 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85a08000 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec88b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a44f8c r4:85a44c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a44f8c r4:85a6ca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85a08000 r8:85a6caac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85a6ca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a6ca80 r8:80287e08 r7:ece2de60 r6:857f6d80 r5:85a08000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:85a6f540 Call trace: Exception stack(0xe05c1d28 to 0xe05c1d70) r4:e05c1dc0 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecdfde08 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r7:dddced80 r6:83018000 r5:85a4578c r4:85a6cb00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:992:6337 blocked for more than 476 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:992 state:D stack:0 pid:6337 tgid:6337 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ece35d84 r8:00000002 r7:60000013 r6:ece35d8c r5:851fec00 r4:851fec00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:851fec00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece35e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a6f980 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:851fec00 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced80 r6:83018000 r5:85a4538c r4:85a6cc00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:85a6cc00 r8:80287e08 r7:ecdfde60 r6:85a6cc80 r5:851fec00 INFO: task kworker/0:992:6337 is blocked on a mutex likely owned by task kworker/1:204:3660. 1d60: 80230ad0 80239bb0 800f0013 ffffffff [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fa0: 00000000 00000000 00000000 00000000 task:kworker/0:993 state:D stack:0 pid:6339 tgid:6339 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece3de08 r5:00001000 r4:eca0b000 r7:dddced80 r6:83018000 r5:85a45b8c r4:85a6cd00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851fd400 r8:85a6cd2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85a6cd00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a6cd00 r8:80287e08 r7:ecdfde60 r6:85a6cd80 r5:851fd400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xece3dfb0 to 0xece3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a6f900 INFO: task kworker/0:993:6339 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: c02e9000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Call trace: [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced80 r6:83018000 r5:85a4638c r4:85a6ce00 r10:00000000 r9:85a6ce00 r8:80287e08 r7:ece3de60 r6:85a6ce80 r5:85200000 r4:85a6f900 Workqueue: events bpf_prog_free_deferred Exception stack(0xe05c1d28 to 0xe05c1d70) r4:82ac21e4 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:85200c00 r4:8291a680 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece45e08 r4:00000000 r5:00001000 r4:eca2d000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a45f8c r4:85a6cf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85200c00 r8:85a6cf2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85a6cf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a6cf00 r8:80287e08 r7:ece41e60 r6:85a6cf80 r5:85200c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xece45fb0 to 0xece45ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a6fac0 INFO: task kworker/0:995:6343 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: c0729000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xe05c1fb0 to 0xe05c1ff8) INFO: task kworker/0:996:6345 blocked for more than 476 seconds. r4:85201800 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece49e08 r9:83018005 r8:85201800 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 r7:dddced80 r6:83018000 r5:85a4678c r4:85a89000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:997:6347 blocked for more than 476 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:997 state:D stack:0 pid:6347 tgid:6347 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ece4dd84 r8:00000002 r7:60000113 r6:ece4dd8c r5:85202400 r4:85202400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85202400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece4de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84807ec0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85202400 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca77000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a46b8c r4:85a46800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a46b8c r4:85a89100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85202400 r8:85a8912c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85a89100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a89100 r8:80287e08 r7:ece49e60 r6:85a89180 r5:85202400 r4:00000001 Exception stack(0xece4dfb0 to 0xece4dff8) Workqueue: events bpf_prog_free_deferred 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 Exception stack(0xe05c1fb0 to 0xe05c1ff8) INFO: task kworker/0:998:6350 blocked for more than 476 seconds. r4:85203000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece51e08 r9:83018005 r8:85203000 r7:00000000 r6:83018000 r5:00001000 r4:7f057000 r5:85a46f8c r4:85a46c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a46f8c r4:85a89200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85203000 r8:85a8922c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85a89200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a89200 r8:80287e08 r7:ece4de60 r6:85a89280 r5:85203000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xece51fb0 to 0xece51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a71b40 INFO: task kworker/0:998:6350 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: c0f84000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 Workqueue: events bpf_prog_free_deferred [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r7:dddced80 r6:83018000 r5:85a4778c r4:85a89300 r10:00000000 r9:85a89300 r8:80287e08 r7:ece51e60 r6:85a89380 r5:85203c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xece01fb0 to 0xece01ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84807740 INFO: task kworker/0:999:6351 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: c0f84000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:1000:6353 blocked for more than 476 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:1000 state:D stack:0 pid:6353 tgid:6353 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ece55d84 r8:00000002 r7:60000013 r6:ece55d8c r5:85204800 r4:85204800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85204800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece55e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a8f0c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85204800 r7:00000000 r6:83018000 r5:00001000 r4:7f059000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca9f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a4738c r4:85a47000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a4738c r4:85a89400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85204800 r8:85a8942c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85a89400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a89400 r8:80287e08 r7:ece01e60 r6:85a89480 r5:85204800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xece55fb0 to 0xece55ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a8f1c0 INFO: task kworker/0:1000:6353 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r5:800f0013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85205400 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece5de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a8f440 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85205400 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecad3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a47b8c r4:85a47800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a47b8c r4:85a89500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85205400 r8:85a8952c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85a89500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a89500 r8:80287e08 r7:ece01e60 r6:85a89580 r5:85205400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xece5dfb0 to 0xece5dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a8f100 INFO: task kworker/0:1001:6355 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: c12ff000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xe05c1fb0 to 0xe05c1ff8) r4:84ba8980 Call trace: [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:85206000 r7:00000000 r6:83018000 r5:00001000 r4:7f05f000 r7:dddced80 r6:83018000 r5:85a47f8c r4:85a89600 r10:61c88647 r9:85206000 r8:85a8962c r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xece61fb0 to 0xece61ff8) task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 Exception stack(0xe05c1fb0 to 0xe05c1ff8) r4:84ba8980 Workqueue: events bpf_prog_free_deferred [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a8f780 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85206c00 r7:00000000 r6:83018000 r5:00001000 r4:7f061000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecaf7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a4c38c r4:85a4c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a4c38c r4:85a89700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85206c00 r8:85a8972c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85a89700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a89700 r8:80287e08 r7:ece61e60 r6:85a89780 r5:85206c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xece65fb0 to 0xece65ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a8f2c0 INFO: task kworker/0:1003:6359 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: c1a2c000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-rc7-syzkaller #0 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r9:83018005 r8:85aa8000 r7:00000000 r6:83018000 r5:00001000 r4:7f0b7000 r7:dddced80 r6:83018000 r5:85a4cb8c r4:85a89800 r10:61c88647 r9:85aa8000 r8:85a8982c r7:82804d40 r6:dddced80 r5:dddceda0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:1005:6363 blocked for more than 476 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:1005 state:D stack:0 pid:6363 tgid:6363 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ece59d84 r8:00000002 r7:60000013 r6:ece59d8c r5:85aa8c00 r4:85aa8c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85aa8c00 r4:8291a680 [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece59e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a8f8c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85aa8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f09f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb03000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a4c78c r4:85a4c400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a4c78c r4:85a89900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85aa8c00 r8:85a8992c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85a89900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a89900 r8:80287e08 r7:ece69e60 r6:85a89980 r5:85aa8c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xece59fb0 to 0xece59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 r4:84bb2000 Exception stack(0xe05c1fb0 to 0xe05c1ff8) INFO: task kworker/0:1006:6364 blocked for more than 476 seconds. r4:85aaa400 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece6de08 r9:83018005 r8:85aaa400 r7:00000000 r6:83018000 r5:00001000 r4:7f0bb000 r7:dddced80 r6:83018000 r5:85a4cf8c r4:85a89a00 r10:61c88647 r9:85aaa400 r8:85a89a2c r7:82804d40 r6:dddced80 r5:dddceda0 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 r4:84bb2000 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:1007:6368 blocked for more than 476 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:1007 state:D stack:0 pid:6368 tgid:6368 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ece79d84 r8:00000002 r7:60000013 r6:ece79d8c r5:85aabc00 r4:85aabc00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85aabc00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece79e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a98400 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85aabc00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d9000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece97000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a4db8c r4:85a4d800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a4db8c r4:85a89b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85aabc00 r8:85a89b2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85a89b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a89b00 r8:80287e08 r7:ece6de60 r6:85a89b80 r5:85aabc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xece79fb0 to 0xece79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a8fc00 INFO: task kworker/0:1007:6368 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: c23d4000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r5:00001000 r4:dfd53000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:605 state:D stack:0 pid:6369 tgid:6369 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:85aab000 r8:857f6e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred 1d60: 80230ad0 80239bb0 800f0013 ffffffff [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:1008:6371 blocked for more than 476 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:1008 state:D stack:0 pid:6371 tgid:6371 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ece89d84 r8:00000002 r7:60000013 r6:ece89d8c r5:85aad400 r4:85aad400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85aad400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece89e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced80 r6:83018000 r5:85a4d38c r4:85a89c80 r4:85a89c80 r10:00000000 r9:85a89c80 r8:80287e08 r7:ece79e60 r6:85a89d00 r5:85aad400 Workqueue: events bpf_prog_free_deferred 1d60: 80230ad0 80239bb0 800f0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced80 r6:83018000 r5:85a4d78c r4:85a89d80 r4:85a89d80 5fa0: 00000000 00000000 00000000 00000000 r4:00000000 1d60: 80230ad0 80239bb0 800f0013 ffffffff [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:1010 state:D stack:0 pid:6375 tgid:6375 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecea1d84 r8:00000002 r7:60000013 r6:ecea1d8c r5:85aa9800 r4:85aa9800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85aa9800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecea1e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a98600 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85aa9800 r7:00000000 r6:83018000 r5:00001000 r4:7f0db000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecea3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a4df8c r4:85a4dc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a4df8c r4:85a89e80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85aa9800 r8:85a89eac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85a89e80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a89e80 r8:80287e08 r7:ece79e60 r6:85a89f00 r5:85aa9800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecea1fb0 to 0xecea1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a98280 INFO: task kworker/0:1010:6375 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: c2a1e000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:1011:6377 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:1011 state:D stack:0 pid:6377 tgid:6377 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eceadd84 r8:00000002 r7:60000013 r6:eceadd8c r5:84a58000 r4:84a58000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a58000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eceade08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a98fc0 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a4eb8c r4:85a89f80 r4:85a89f80 dfa0: 00000000 00000000 00000000 00000000 Call trace: 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:1012:6378 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:1012 state:D stack:0 pid:6378 tgid:6378 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ece75d84 r8:00000002 r7:60000013 r6:ece75d8c r5:84a58c00 r4:84a58c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a58c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece75e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a98800 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a58c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0dd000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceaf000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a4e38c r4:85a4e000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a4e38c r4:85a97080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a58c00 r8:85a970ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85a97080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a97080 r8:80287e08 r7:eceade60 r6:85a97100 r5:84a58c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xece75fb0 to 0xece75ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a98540 INFO: task kworker/0:1012:6378 is blocked on a mutex likely owned by task kworker/1:204:3660. r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r5:800f0013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 Exception stack(0xe05c1fb0 to 0xe05c1ff8) INFO: task kworker/0:1013:6381 blocked for more than 477 seconds. r4:84a5b000 [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:85a4e78c r4:85a4e400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:85a97180 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 1d20: c3122000 dfb47000 00000001 80239b98 7f2fb000 00000001 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:606:6384 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:606 state:D stack:0 pid:6384 tgid:6384 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eced5d84 r8:00000002 r7:60000013 r6:eced5d8c r5:84a59800 r4:84a59800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a59800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eced5e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b15d80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a59800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb57f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85adcf8c r4:85adcc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85adcf8c r4:857f6e80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a59800 r8:857f6eac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857f6e80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857f6e80 r8:80287e08 r7:ec955e60 r6:85a97280 r5:84a59800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeced5fb0 to 0xeced5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a7ccc0 INFO: task kworker/1:606:6384 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: c3548000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:607:6385 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:607 state:D stack:0 pid:6385 tgid:6385 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eced9d84 r8:00000002 r7:60000113 r6:eced9d8c r5:84a5c800 r4:84a5c800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a5c800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eced9e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a35e80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a5c800 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec5c5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8471f78c r4:8471f400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8471f78c r4:857f6f00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a5c800 r8:857f6f2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857f6f00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857f6f00 r8:80287e08 r7:eced5e60 r6:85a97300 r5:84a5c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeced9fb0 to 0xeced9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a7ccc0 INFO: task kworker/1:607:6385 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: c3548000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:1014:6388 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:1014 state:D stack:0 pid:6388 tgid:6388 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eceddd84 r8:00000002 r7:60000113 r6:eceddd8c r5:84a5bc00 r4:84a5bc00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a5bc00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecedde08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a95100 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a5bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f06b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a4f38c r4:85a97380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a5bc00 r8:85a973ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85a97380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a97380 r8:80287e08 r7:eceade60 r6:85a97400 r5:84a5bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeceddfb0 to 0xeceddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a98d00 INFO: task kworker/0:1014:6388 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:82ac21e4 r4:00000000 r5:84be0b8c r4:84be0800 r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r9:83018005 r8:84a5e000 r7:00000000 r6:83018000 r5:00001000 r4:7f069000 r5:85a4ef8c r4:85a4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84a5e000 r8:85a974ac r7:82804d40 r6:dddced80 r5:dddceda0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:82ac21e4 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:1016:6392 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:1016 state:D stack:0 pid:6392 tgid:6392 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eced1d84 r8:00000002 r7:60000113 r6:eced1d8c r5:84a5a400 r4:84a5a400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a5a400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eced1e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a95540 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a5a400 r7:00000000 r6:83018000 r5:00001000 r4:7f06f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebcad000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a4fb8c r4:85a4f800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a4fb8c r4:85a97580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a5a400 r8:85a975ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85a97580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a97580 r8:80287e08 r7:ecedde60 r6:85a97600 r5:84a5a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeced1fb0 to 0xeced1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a951c0 INFO: task kworker/0:1016:6392 is blocked on a mutex likely owned by task kworker/1:204:3660. Workqueue: events bpf_prog_free_deferred 1d20: c3aee000 dfb47000 00000001 80239b98 7f2fb000 00000001 r4:00000000 r5:00001000 r4:dfd53000 r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85a4f78c r4:85a4f400 r10:61c88647 r9:84a5ec00 r8:85a976ac r7:82804d40 r6:dddced80 r5:dddceda0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 1d60: 80230ad0 80239bb0 800f0013 ffffffff r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:1018:6396 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:1018 state:D stack:0 pid:6396 tgid:6396 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ece71d84 r8:00000002 r7:60000113 r6:ece71d8c r5:84a5d400 r4:84a5d400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a5d400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece71e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a95640 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a5d400 r7:00000000 r6:83018000 r5:00001000 r4:7f071000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebcdb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a4ff8c r4:85a4fc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a4ff8c r4:85a97780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a5d400 r8:85a977ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85a97780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a97780 r8:80287e08 r7:eced1e60 r6:85a97800 r5:84a5d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xece71fb0 to 0xece71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a953c0 INFO: task kworker/0:1018:6396 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: c3d54000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 INFO: task kworker/0:1019:6398 blocked for more than 477 seconds. r4:85aaec00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecee9e08 r5:00001000 r4:ec51f000 r5:85a5838c r4:85a58000 r10:61c88647 r9:85aaec00 r8:85a978ac r7:82804d40 r6:dddced80 r5:dddceda0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced80 r6:83018000 r5:85a58b8c r4:85a97980 r4:85a97980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a97980 r8:80287e08 r7:ecee9e60 r6:85a97a00 r5:85ab8000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeceedfb0 to 0xeceedff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a95440 INFO: task kworker/0:1020:6400 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: c42ef000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:1021:6402 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:1021 state:D stack:0 pid:6402 tgid:6402 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecef1d84 r8:00000002 r7:60000113 r6:ecef1d8c r5:85ab9800 r4:85ab9800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85ab9800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecef1e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a95a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85ab9800 r7:00000000 r6:83018000 r5:00001000 r4:7f075000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85a5878c r4:85a58400 r10:61c88647 r9:85ab9800 r8:85a97aac r7:82804d40 r6:dddced80 r5:dddceda0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:1022:6403 blocked for more than 477 seconds. task:kworker/0:1022 state:D stack:0 pid:6403 tgid:6403 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecef5e08 r5:00001000 r4:ec8ab000 r5:85a58f8c r4:85a58c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85abb000 r8:85a97bac r7:82804d40 r6:dddced80 r5:dddceda0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d80 r6:83018200 r5:8471f38c r4:857f6f80 r10:00000000 r9:857f6f80 r8:80287e08 r7:eced5e60 r6:85a97c80 r5:85abc800 INFO: task kworker/1:608:6407 is blocked on a mutex likely owned by task kworker/1:204:3660. r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: c49ec000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:609:6408 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:609 state:D stack:0 pid:6408 tgid:6408 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecf09d84 r8:00000002 r7:60000113 r6:ecf09d8c r5:85abd400 r4:85abd400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85abd400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecf09e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b152c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85abd400 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8471ef8c r4:8471ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85abd400 r8:85a9902c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Call trace: 1d20: c4d18000 dfb47000 00000001 80239b98 7f2fb000 00000001 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecf11e08 r9:83018205 r8:85abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 r5:85adc38c r4:85adc000 r10:61c88647 r9:85abbc00 r8:85a990ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecf11fb0 to 0xecf11ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85b15140 INFO: task kworker/1:610:6411 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: c4d18000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:611:6412 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:611 state:D stack:0 pid:6412 tgid:6412 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecf15d84 r8:00000002 r7:60000013 r6:ecf15d8c r5:85abe000 r4:85abe000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85abe000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecf15e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b15f00 r5:85adcb8c r4:85adc800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85abe000 r8:85a9912c r7:82804d40 r6:ddde2d80 r5:ddde2da0 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/1:611:6412 is blocked on a mutex likely owned by task kworker/1:204:3660. Exception stack(0xe05c1d28 to 0xe05c1d70) r4:82ac21e4 r4:e05c1dc0 r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:84ba8980 Not tainted 6.15.0-rc7-syzkaller #0 Workqueue: events bpf_prog_free_deferred r5:85abec00 r4:8291a680 [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecf19e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a8e440 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85abec00 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8cf000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a5938c r4:85a59000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a5938c r4:85a97e80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85abec00 r8:85a97eac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85a97e80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a97e80 r8:80287e08 r7:ecef5e60 r6:85a97f00 r5:85abec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecf19fb0 to 0xecf19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a8e040 INFO: task kworker/0:1023:6414 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: c5146000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:612:6440 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:612 state:D stack:0 pid:6440 tgid:6440 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ece85d84 r8:00000002 r7:60000113 r6:ece85d8c r5:85ac8000 r4:85ac8000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85ac8000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a44040 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ade38c r4:85ade000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ade38c r4:85a99180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85ac8000 r8:85a991ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a99180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a99180 r8:80287e08 r7:eced5e60 r6:85a88180 r5:85ac8000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xece85fb0 to 0xece85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85b15c40 INFO: task kworker/1:612:6440 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe05c1d28 to 0xe05c1d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 INFO: task kworker/1:613:6441 blocked for more than 477 seconds. r4:85ac9800 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece91e08 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d80 r6:83018200 r5:85add38c r4:85a99200 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 1d60: 80230ad0 80239bb0 800f0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 r4:00000001 r4:84ba8980 Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:614 state:D stack:0 pid:6443 tgid:6443 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecea9d84 r8:00000002 r7:60000013 r6:ecea9d8c r5:85ac8c00 r4:85ac8c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85ac8c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecea9e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b15740 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85ac8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f031000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb971000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85add78c r4:85add400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85add78c r4:85a99280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85ac8c00 r8:85a992ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a99280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a99280 r8:80287e08 r7:ece85e60 r6:85a88280 r5:85ac8c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecea9fb0 to 0xecea9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85b159c0 INFO: task kworker/1:614:6443 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: c588b000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-rc7-syzkaller #0 r4:85aca400 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecec1e08 r9:83018205 r8:85aca400 r7:00000000 r6:83018200 r5:00001000 r4:7f033000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:85a99300 r8:80287e08 r7:ece85e60 r6:85a88300 r5:85aca400 Workqueue: events bpf_prog_free_deferred 1d20: c5c68000 dfb47000 00000001 80239b98 7f2fb000 00000001 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:616:6447 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:616 state:D stack:0 pid:6447 tgid:6447 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecf41d84 r8:00000002 r7:60000113 r6:ecf41d8c r5:85a09800 r4:85a09800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85a09800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecf41e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a7c440 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85a09800 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb3d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85addf8c r4:85addc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85addf8c r4:85a99380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:85a99380 r8:80287e08 r7:ece85e60 r6:85a99400 r5:85a09800 INFO: task kworker/1:616:6447 is blocked on a mutex likely owned by task kworker/1:204:3660. 1d20: c601d000 dfb47000 00000001 80239b98 7f2fb000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-rc7-syzkaller #0 r5:85a0bc00 r4:8291a680 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:85a0bc00 r8:85a994ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xe05c1d28 to 0xe05c1d70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:84bb2000 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-rc7-syzkaller #0 [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r4:85a0d400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85a0d400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecef9e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a9c3c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85a0d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec65d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85adeb8c r4:85ade800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85adeb8c r4:85a99580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85a0d400 r8:85a995ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a99580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a99580 r8:80287e08 r7:ecf45e60 r6:85a99600 r5:85a0d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecef9fb0 to 0xecef9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a9c000 INFO: task kworker/1:618:6452 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: c6528000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 r5:00001000 r4:dfd53000 r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecf4de08 r9:83018205 r8:85a0e000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:85a99680 r8:80287e08 r7:ecef9e60 r6:85a99700 r5:85a0e000 task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:800f0013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:85a0ec00 r4:8291a680 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a9c680 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85a0ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec7d1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85adf38c r4:85adf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85adf38c r4:85a99780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85a0ec00 r8:85a997ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a99780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a99780 r8:80287e08 r7:ecf4de60 r6:85a99800 r5:85a0ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecf55fb0 to 0xecf55ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a9c2c0 INFO: task kworker/1:620:6456 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: c688e000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:621:6459 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:621 state:D stack:0 pid:6459 tgid:6459 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecf59d84 r8:00000002 r7:60000113 r6:ecf59d8c r5:85a0c800 r5:85a0c800 r4:8291a680 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a9c7c0 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:85a99880 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe05c1d28 to 0xe05c1d70) r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:622:6461 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:622 state:D stack:0 pid:6461 tgid:6461 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecf61d84 r8:00000002 r7:60000013 r6:ecf61d8c r5:85a0b000 r4:85a0b000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85a0b000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecf61e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a9c940 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85a0b000 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca03000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85adfb8c r4:85adf800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85adfb8c r4:85a99980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85a0b000 r8:85a999ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a99980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a99980 r8:80287e08 r7:ecf59e60 r6:85a99a00 r5:85a0b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecf61fb0 to 0xecf61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a9c640 INFO: task kworker/1:622:6461 is blocked on a mutex likely owned by task kworker/1:204:3660. Call trace: Exception stack(0xe05c1d28 to 0xe05c1d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:623 state:D stack:0 pid:6462 tgid:6462 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecf51d84 r8:00000002 r7:60000113 r6:ecf51d8c r5:85a0a400 r4:85a0a400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85a0a400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecf51e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a9cb80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:eca2b000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe05c1d28 to 0xe05c1d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:84ba8980 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:85a99b80 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecf65fb0 to 0xecf65ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a9ca00 INFO: task kworker/1:624:6464 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: c7130000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:625:6467 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:625 state:D stack:0 pid:6467 tgid:6467 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecf69d84 r8:00000002 r7:60000013 r6:ecf69d8c r5:859e6c00 r4:859e6c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:859e6c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecf69e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ae478c r4:85ae4400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe05c1d28 to 0xe05c1d70) r5:800f0013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/1:626:6468 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:626 state:D stack:0 pid:6468 tgid:6468 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecf6dd84 r8:00000002 r7:60000013 r6:ecf6dd8c r5:85940000 r4:85940000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85940000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecf6de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a9cdc0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85940000 r7:00000000 r6:83018200 r5:00001000 r4:7f049000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca6b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ae438c r4:85ae4000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ae438c r4:85a99d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85940000 r8:85a99dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a99d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a99d80 r8:80287e08 r7:ecf69e60 r6:85a99e00 r5:85940000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecf6dfb0 to 0xecf6dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a9cc40 INFO: task kworker/1:626:6468 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: c7738000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 Exception stack(0xe05c1fb0 to 0xe05c1ff8) INFO: task kworker/1:627:6471 blocked for more than 477 seconds. r5:85940c00 r4:8291a680 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecf71e08 r9:83018205 r8:85940c00 r7:00000000 r6:83018200 r5:00001000 r4:7f05d000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:85a99e80 r8:80287e08 r7:ecf69e60 r6:85a99f00 r5:85940c00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/1:628:6472 blocked for more than 477 seconds. r4:85941800 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a8eec0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85941800 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecaa7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ae4b8c r4:85ae4800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ae4b8c r4:85a99f80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85941800 r8:85a99fac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a99f80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a99f80 r8:80287e08 r7:ecf71e60 r6:85a78000 r5:85941800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecf79fb0 to 0xecf79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85b1d940 INFO: task kworker/1:628:6472 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: c78ed000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:629:6474 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:629 state:D stack:0 pid:6474 tgid:6474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecf75d84 r8:00000002 r7:60000013 r6:ecf75d8c r5:85942400 r4:85942400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85942400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecf75e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b1df80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85942400 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:85a78080 r8:80287e08 r7:ecf71e60 r6:85a78100 r5:85942400 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: c7b9b000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:630:6476 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:630 state:D stack:0 pid:6476 tgid:6476 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecf7dd84 r8:00000002 r7:60000013 r6:ecf7dd8c r5:85943000 r4:85943000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85943000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecf7de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a6d140 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85943000 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ae538c r4:85ae5000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:82ac21e4 r4:e05c1dc0 r5:00001000 r4:dfd53000 r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xe05c1fb0 to 0xe05c1ff8) r4:84ba8980 Workqueue: events bpf_prog_free_deferred r5:85943c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecf81e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a6d300 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85943c00 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecafb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ae578c r4:85ae5400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ae578c r4:85a78280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85943c00 r8:85a782ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a78280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a78280 r8:80287e08 r7:ecf71e60 r6:85a78300 r5:85943c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecf81fb0 to 0xecf81ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a6d180 INFO: task kworker/1:631:6479 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: c8128000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:84ba8980 Workqueue: events bpf_prog_free_deferred [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xe05c1d28 to 0xe05c1d70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:84bb2000 r4:00000001 1fa0: 00000000 00000000 00000000 00000000 Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:633 state:D stack:0 pid:6481 tgid:6481 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecf89d84 r8:00000002 r7:60000113 r6:ecf89d8c r5:85945400 r4:85945400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85945400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecf89e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a6d680 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85945400 r7:00000000 r6:83018200 r5:00001000 r4:7f057000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc57000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ae5f8c r4:85ae5c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ae5f8c r4:85a78480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85945400 r8:85a784ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a78480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a78480 r8:80287e08 r7:ecf71e60 r6:85a78500 r5:85945400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecf89fb0 to 0xecf89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a6d500 INFO: task kworker/1:633:6481 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: c8415000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a6db00 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ae638c r4:85ae6000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: 1d20: c8415000 dfb47000 00000001 80239b98 7f2fb000 00000001 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:85b91800 r7:00000000 r6:83018200 r5:00001000 r4:7f09f000 r7:ddde2d80 r6:83018200 r5:85ae6f8c r4:85a78680 r4:85a78680 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/1:635:6487 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: c8867000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:636:6490 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:636 state:D stack:0 pid:6490 tgid:6490 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecfa1d84 r8:00000002 r7:60000013 r6:ecfa1d8c r5:85b90c00 r4:85b90c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85b90c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecfa1e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a6de80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:85b90c00 r8:85a787ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xe05c1d28 to 0xe05c1d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:84ba8980 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85b93000 r8:85a788ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a78880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a78880 r8:80287e08 r7:ecf99e60 r6:85a78900 r5:85b93000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecfa5fb0 to 0xecfa5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a6df00 INFO: task kworker/1:637:6491 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: c8db5000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:638:6495 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:638 state:D stack:0 pid:6495 tgid:6495 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecf8dd84 r8:00000002 r7:60000113 r6:ecf8dd8c r5:85acc800 r4:85acc800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85acc800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecf8de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a66540 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85acc800 r7:00000000 r6:83018200 r5:00001000 r4:7f0af000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ae7b8c r4:85ae7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:85a78a00 r8:80287e08 r7:ecfa5e60 r6:85a88380 r5:85acc800 INFO: task kworker/1:638:6495 is blocked on a mutex likely owned by task kworker/1:204:3660. 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xe05c1fb0 to 0xe05c1ff8) INFO: task kworker/1:639:6497 blocked for more than 477 seconds. r4:85acb000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecf95e08 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred Exception stack(0xe05c1d28 to 0xe05c1d70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:640:6499 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:640 state:D stack:0 pid:6499 tgid:6499 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecfbdd84 r8:00000002 r7:60000013 r6:ecfbdd8c r5:85acd400 r4:85acd400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85acd400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecfbde08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a668c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85acd400 r7:00000000 r6:83018200 r5:00001000 r4:7f0b5000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecfc5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85af078c r4:85af0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85af078c r4:85a78b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85acd400 r8:85a78b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a78b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a78b00 r8:80287e08 r7:ecf95e60 r6:85a88480 r5:85acd400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecfbdfb0 to 0xecfbdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a66340 INFO: task kworker/1:640:6499 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: c917b000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 r4:e05c1dc0 r5:00001000 r4:dfd53000 r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a667c0 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a66680 INFO: task kworker/1:641:6500 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: c95fb000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:642:6503 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:642 state:D stack:0 pid:6503 tgid:6503 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecfddd84 r8:00000002 r7:60000113 r6:ecfddd8c r5:85aac800 r4:85aac800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85aac800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecfdde08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a66b40 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85aac800 r7:00000000 r6:83018200 r5:00001000 r4:7f0b9000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecfe5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85af0f8c r4:85af0c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85af0f8c r4:85a78c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85aac800 r8:85a78c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a78c00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe05c1d28 to 0xe05c1d70) r4:82ac21e4 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred r5:85b98000 r4:8291a680 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecff5e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a66a40 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85b98000 r7:00000000 r6:83018200 r5:00001000 r4:7f0b7000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecfd5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85af0b8c r4:85af0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85af0b8c r4:85a78c80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85b98000 r8:85a78cac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a78c80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a78c80 r8:80287e08 r7:ecfdde60 r6:85a88600 r5:85b98000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecff5fb0 to 0xecff5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a66840 INFO: task kworker/1:643:6505 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: c9d7c000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:dfd53000 r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:85a78d00 r8:80287e08 r7:ecfdde60 r6:85a88680 r5:85b98c00 task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:800f0013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xe05c1fb0 to 0xe05c1ff8) INFO: task kworker/1:645:6511 blocked for more than 477 seconds. r4:85b99800 [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:85af178c r4:85af1400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85b99800 r8:85a78dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a66c00 INFO: task kworker/1:645:6511 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: ca40b000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:646:6514 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:646 state:D stack:0 pid:6514 tgid:6514 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed015d84 r8:00000002 r7:60000113 r6:ed015d8c r5:85b9bc00 r4:85b9bc00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85b9bc00 r4:8291a680 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed015e08 r9:83018205 r8:85b9bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f063000 r5:85af1b8c r4:85af1800 r7:ddde2d80 r6:83018200 r5:85af1b8c r4:85a78e00 r4:85a78e00 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 r4:e05c1dc0 r5:00001000 r4:dfd53000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed019e08 r9:83018205 r8:85b9a400 r7:00000000 r6:83018200 r5:00001000 r4:7f065000 r5:85af1f8c r4:85af1c00 r10:61c88647 r9:85b9a400 r8:85a78eac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe05c1d28 to 0xe05c1d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:648 state:D stack:0 pid:6517 tgid:6517 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed021d84 r8:00000002 r7:60000113 r6:ed021d8c r5:85b9d400 r4:85b9d400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85b9d400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed021e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a73b00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85b9d400 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec89b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85af378c r4:85af3400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85af378c r4:85a78f00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85b9d400 r8:85a78f2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a78f00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a78f00 r8:80287e08 r7:ed019e60 r6:85a88880 r5:85b9d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 1fa0: 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe05c1d28 to 0xe05c1d70) r4:82ac21e4 r4:e05c1dc0 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:649:6518 blocked for more than 478 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:649 state:D stack:0 pid:6518 tgid:6518 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed025d84 r8:00000002 r7:60000113 r6:ed025d8c r5:85b9b000 r4:85b9b000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85b9b000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed025e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a73040 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85b9b000 r7:00000000 r6:83018200 r5:00001000 r4:7f067000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb85d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85af238c r4:85af2000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85af238c r4:85a78f80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a66940 INFO: task kworker/1:649:6518 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: caae5000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85af278c r4:85af2400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85af278c r4:85a78980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85b9c800 r8:85a789ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a78980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a78980 r8:80287e08 r7:ed021e60 r6:85a88980 r5:85b9c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed02dfb0 to 0xed02dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a731c0 INFO: task kworker/1:650:6520 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: caae5000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:651:6522 blocked for more than 478 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:651 state:D stack:0 pid:6522 tgid:6522 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed035d84 r8:00000002 r7:60000013 r6:ed035d8c r5:85b9e000 r4:85b9e000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed035e08 r9:83018205 r8:85b9e000 r7:00000000 r6:83018200 r5:00001000 r4:7f06b000 r5:85af2b8c r4:85af2800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85b9e000 r8:85a6402c r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xe05c1d28 to 0xe05c1d70) [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r5:84be0b8c r4:84be0800 r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:8291a684 r9:ed041d84 r8:00000002 r7:60000013 r6:ed041d8c r5:85b9ec00 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:85af2f8c r4:85af2c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:85a64080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a64080 r8:80287e08 r7:ed021e60 r6:85a88a80 r5:85b9ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed041fb0 to 0xed041ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a732c0 INFO: task kworker/1:652:6524 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: cb070000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 INFO: task kworker/1:653:6526 blocked for more than 478 seconds. r5:85b90000 r4:8291a680 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecfcde08 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85b5bf8c r4:85b5bc00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xe05c1d28 to 0xe05c1d70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xe05c1fb0 to 0xe05c1ff8) INFO: task kworker/1:654:6532 blocked for more than 478 seconds. r10:8291a684 r9:ed04dd84 r8:00000002 r7:60000013 r6:ed04dd8c r5:85b95400 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:ec765000 r5:85af338c r4:85af3000 r10:61c88647 r9:85b95400 r8:85a6422c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a64200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a64200 r8:80287e08 r7:ed021e60 r6:85a64280 r5:85b95400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed04dfb0 to 0xed04dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a73780 INFO: task kworker/1:654:6532 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: cb6e3000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:655:6534 blocked for more than 478 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:655 state:D stack:0 pid:6534 tgid:6534 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed051d84 r8:00000002 r7:60000113 r6:ed051d8c r5:85b96c00 r4:85b96c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85b96c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:85af3b8c r4:85af3800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85b96c00 r8:85a6432c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe05c1d28 to 0xe05c1d70) [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:85b92400 r4:8291a680 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:85af438c r4:85af4000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:85a64400 r8:80287e08 r7:ed051e60 r6:85a64480 r5:85b92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed055fb0 to 0xed055ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a73b80 INFO: task kworker/1:656:6536 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: cbbef000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:657:6538 blocked for more than 478 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:657 state:D stack:0 pid:6538 tgid:6538 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed059d84 r8:00000002 r7:60000013 r6:ed059d8c r5:85b93c00 r4:85b93c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85b93c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:85af3f8c r4:85af3c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:85a64500 r8:80287e08 r7:ed055e60 r6:85a64580 r5:85b93c00 INFO: task kworker/1:657:6538 is blocked on a mutex likely owned by task kworker/1:204:3660. 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:85acbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f0cb000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfa0: 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe05c1d28 to 0xe05c1d70) [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/1:659:6545 blocked for more than 478 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:659 state:D stack:0 pid:6545 tgid:6545 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed05dd84 r8:00000002 r7:60000013 r6:ed05dd8c r5:85acec00 r4:85acec00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85acec00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed05de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a7e500 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85acec00 r7:00000000 r6:83018200 r5:00001000 r4:7f0cd000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecbcf000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85af4b8c r4:85af4800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85af4b8c r4:85a64680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85acec00 r8:85a646ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a64680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a64680 r8:80287e08 r7:ed03de60 r6:85a88b80 r5:85acec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed05dfb0 to 0xed05dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a805c0 INFO: task kworker/1:659:6545 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: cc7b2000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:848a0000 r7:00000000 r6:83018200 r5:00001000 r4:7f0d1000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a7e300 INFO: task kworker/1:660:6551 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: cc7b2000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:661:6554 blocked for more than 478 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:661 state:D stack:0 pid:6554 tgid:6554 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed075d84 r8:00000002 r7:60000113 r6:ed075d8c r5:848a0c00 r4:848a0c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848a0c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed075e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a7eac0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848a0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0d5000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecefb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85af5b8c r4:85af5800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85af5b8c r4:85a64780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:85a64780 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed081e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a7e9c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f0d3000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc41000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85af578c r4:85af5400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85af578c r4:85a64800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848a2400 r8:85a6482c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a64800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a64800 r8:80287e08 r7:ed075e60 r6:85a88d00 r5:848a2400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed081fb0 to 0xed081ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a7e840 INFO: task kworker/1:662:6556 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r4:848a3000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed08de08 r5:00001000 r4:ed011000 r5:85af5f8c r4:85af5c00 r10:61c88647 r9:848a3000 r8:85a648ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: ccd87000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:664:6560 blocked for more than 478 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:664 state:D stack:0 pid:6560 tgid:6560 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed091d84 r8:00000002 r7:60000013 r6:ed091d8c r5:848a3c00 r4:848a3c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848a3c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed091e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a7edc0 r9:83018205 r8:848a3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0d9000 r5:85af638c r4:85af6000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:85a64900 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:665:6562 blocked for more than 478 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:665 state:D stack:0 pid:6562 tgid:6562 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed09dd84 r8:00000002 r7:60000113 r6:ed09dd8c r5:848a4800 r4:848a4800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848a4800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed09de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a87040 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848a4800 r7:00000000 r6:83018200 r5:00001000 r4:7f0e1000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed0bd000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85af738c r4:85af7000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85af738c r4:85a64980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848a4800 r8:85a649ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a64980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a64980 r8:80287e08 r7:ed091e60 r6:85a88e80 r5:848a4800 r4:85a7ec40 Call trace: 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed0a9e08 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed099000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85af678c r4:85af6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85af678c r4:85a64a00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848a5400 r8:85a64a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a64a00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a64a00 r8:80287e08 r7:ed09de60 r6:85a88f00 r5:848a5400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed0a9fb0 to 0xed0a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a7ed80 INFO: task kworker/1:666:6564 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 Exception stack(0xe05c1d28 to 0xe05c1d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r5:84be0b8c r4:84be0800 r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:848a6000 [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:848a6000 r7:00000000 r6:83018200 r5:00001000 r4:7f0dd000 r5:85af6b8c r4:85af6800 r10:61c88647 r9:848a6000 r8:85a64aac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 1d60: 80230ad0 80239bb0 800f0013 ffffffff r4:e05c1dc0 r5:00001000 r4:dfd53000 r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed0d1e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a80600 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85ad0000 r7:00000000 r6:83018200 r5:00001000 r4:7f0df000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed0b5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85af6f8c r4:85af6c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85af6f8c r4:85a64b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85ad0000 r8:85a64b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a64b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a64b00 r8:80287e08 r7:ed09de60 r6:85a7a000 r5:85ad0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed0d1fb0 to 0xed0d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a87000 INFO: task kworker/1:668:6569 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: cda2f000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:8291a684 r9:ecfe9d84 r8:00000002 r7:60000013 r6:ecfe9d8c r5:85b96000 r4:00000000 r4:00000000 r5:85af7b8c r4:85af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xe05c1d28 to 0xe05c1d70) [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r5:84be0b8c r4:84be0800 r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:84ba8980 Workqueue: events bpf_prog_free_deferred r5:85b94800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed07de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a87300 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85b94800 r7:00000000 r6:83018200 r5:00001000 r4:7f0e3000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed0c9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85af778c r4:85af7400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85af778c r4:85a64c80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85b94800 r8:85a64cac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a64c80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a64c80 r8:80287e08 r7:ecfe9e60 r6:85a64d00 r5:85b94800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed07dfb0 to 0xed07dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a87180 INFO: task kworker/1:670:6572 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: cde4a000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/1:671:6574 blocked for more than 478 seconds. [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:85af7f8c r4:85af7c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:85a64d80 r8:80287e08 r7:ecfe9e60 r6:85a64e00 r5:85946000 INFO: task kworker/1:671:6574 is blocked on a mutex likely owned by task kworker/1:204:3660. 1d60: 80230ad0 80239bb0 800f0013 ffffffff r4:e05c1dc0 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:672:6577 blocked for more than 478 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:672 state:D stack:0 pid:6577 tgid:6577 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed0e9d84 r8:00000002 r7:60000113 r6:ed0e9d8c r5:85ba0000 r4:85ba0000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85ba0000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed0e9e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a87780 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85ba0000 r7:00000000 r6:83018200 r5:00001000 r4:7f0e9000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed0f1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85afc38c r4:85afc000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85afc38c r4:85a64e80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85ba0000 r8:85a64eac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 Exception stack(0xe05c1fb0 to 0xe05c1ff8) INFO: task kworker/1:673:6578 blocked for more than 478 seconds. r4:85ba0c00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed0f5e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a87900 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85ba0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0eb000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed0fd000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85afc78c r4:85afc400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85afc78c r4:85a64f80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85ba0c00 r8:85a64fac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a64f80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a64f80 r8:80287e08 r7:ed0e9e60 r6:85a6a000 r5:85ba0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed0f5fb0 to 0xed0f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a87600 INFO: task kworker/1:673:6578 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: ce57b000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:674:6580 blocked for more than 478 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:674 state:D stack:0 pid:6580 tgid:6580 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed101d84 r8:00000002 r7:60000013 r6:ed101d8c r5:85ba1800 [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ed109000 r5:85afcb8c r4:85afc800 r4:85a6a080 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:85ba2400 r7:00000000 r6:83018200 r5:00001000 r4:7f0ef000 r5:85afcf8c r4:85afcc00 r10:61c88647 r9:85ba2400 r8:85a6a1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xe05c1fb0 to 0xe05c1ff8) Not tainted 6.15.0-rc7-syzkaller #0 r4:85ba3000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed119e08 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a87d80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85ba3000 r7:00000000 r6:83018200 r5:00001000 r4:7f0f1000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed121000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85afd38c r4:85afd000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85afd38c r4:85a6a280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85ba3000 r8:85a6a2ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a6a280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a6a280 r8:80287e08 r7:ed10de60 r6:85a6a300 r5:85ba3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed119fb0 to 0xed119ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a87a00 INFO: task kworker/1:676:6584 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: cea70000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 INFO: task kworker/1:677:6586 blocked for more than 478 seconds. r5:85ba3c00 r4:8291a680 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a44200 r5:85afdb8c r4:85afd800 r10:61c88647 r9:85ba3c00 r8:85a6a3ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xe05c1fb0 to 0xe05c1ff8) Not tainted 6.15.0-rc7-syzkaller #0 r4:85ba4800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85ba4800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed131e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a87f00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85ba4800 r7:00000000 r6:83018200 r5:00001000 r4:7f0f3000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed12d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85afd78c r4:85afd400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85afd78c r4:85a6a480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85ba4800 r8:85a6a4ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a6a480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a6a480 r8:80287e08 r7:ed125e60 r6:85a6a500 r5:85ba4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed131fb0 to 0xed131ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a87d00 INFO: task kworker/1:678:6588 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: ced23000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 Exception stack(0xe05c1fb0 to 0xe05c1ff8) INFO: task kworker/1:679:6592 blocked for more than 478 seconds. r4:85ba6c00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece9de08 r5:00001000 r4:eab2b000 r5:85afdf8c r4:85afdc00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe05c1d28 to 0xe05c1d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r5:84be0b8c r4:84be0800 r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r5:85ba8000 r4:8291a680 r4:00000000 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:85a6a680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a6a680 r8:80287e08 r7:ece9de60 r6:85a6a700 r5:85ba8000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeceb5fb0 to 0xeceb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847aa080 INFO: task kworker/1:680:6593 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: cef3f000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:681:6596 blocked for more than 478 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:681 state:D stack:0 pid:6596 tgid:6596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r4:85ba8c00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed155e08 r5:00001000 r4:eb89b000 r5:85afe38c r4:85afe000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:85a6a780 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:85ba9800 r7:00000000 r6:83018200 r5:00001000 r4:7f033000 r5:85afeb8c r4:85afe800 r4:85a6a880 dfa0: 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r5:84be0b8c r4:84be0800 r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:683:6601 blocked for more than 478 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:683 state:D stack:0 pid:6601 tgid:6601 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed0cdd84 r8:00000002 r7:60000113 r6:ed0cdd8c r5:85baa400 r4:85baa400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85baa400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed0cde08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847aa680 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85baa400 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebbbd000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85afef8c r4:85afec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85afef8c r4:85a6a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85baa400 r8:85a6a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a6a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a6a980 r8:80287e08 r7:ed13de60 r6:85a6aa00 r5:85baa400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed0cdfb0 to 0xed0cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847aa740 INFO: task kworker/1:683:6601 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: cfa7f000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ec60b000 r5:85aff38c r4:85aff000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85aff38c r4:85a6aa80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85bab000 r8:85a6aaac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a6aa80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a6aa80 r8:80287e08 r7:ed0cde60 r6:85a6ab00 r5:85bab000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed159fb0 to 0xed159ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847aa600 INFO: task kworker/1:684:6603 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: cfa7f000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:85affb8c r4:85aff800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85babc00 r8:85a6abac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r5:00001000 r4:dfd53000 r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed161e08 r9:83018205 r8:85bac800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 r5:85aff78c r4:85aff400 r10:61c88647 r9:85bac800 r8:85a6acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847aaa00 r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r5:800f0013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:687:6609 blocked for more than 478 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:687 state:D stack:0 pid:6609 tgid:6609 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed165d84 r8:00000002 r7:60000113 r6:ed165d8c r5:85bad400 r4:85bad400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85bad400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed165e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847aafc0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85bad400 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85b0838c r4:85b08000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b0838c r4:85a6ad80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85bad400 r8:85a6adac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a6ad80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a6ad80 r8:80287e08 r7:ed15de60 r6:85a6ae00 r5:85bad400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed165fb0 to 0xed165ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847aad40 INFO: task kworker/1:687:6609 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: d0284000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:688:6610 blocked for more than 478 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:688 state:D stack:0 pid:6610 tgid:6610 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r5:85bae000 r4:8291a680 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:85afff8c r4:85affc00 r7:ddde2d80 r6:83018200 r5:85afff8c r4:85a6ae80 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xe05c1fb0 to 0xe05c1ff8) INFO: task kworker/1:689:6613 blocked for more than 478 seconds. r4:85baec00 r4:00000000 r4:00000000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca5b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85b0878c r4:85b08400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b0878c r4:85a6af80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85baec00 r8:85a6afac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a6af80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a6af80 r8:80287e08 r7:ed165e60 r6:8479b000 r5:85baec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed16dfb0 to 0xed16dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847aae80 INFO: task kworker/1:689:6613 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: d0284000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 INFO: task kworker/1:690:6615 blocked for more than 478 seconds. r5:85ba6000 r4:8291a680 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:85ba6000 r8:8479b0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xe05c1d28 to 0xe05c1d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-rc7-syzkaller #0 r10:8291a684 r9:ed151d84 r8:00000002 r7:60000113 r6:ed151d8c r5:85ba5400 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:8479b180 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: d06cc000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:692:6618 blocked for more than 478 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:692 state:D stack:0 pid:6618 tgid:6618 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed175d84 r8:00000002 r7:60000113 r6:ed175d8c r5:85bb0000 r4:85bb0000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85bb0000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed175e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8479e500 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85bb0000 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca9b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85b08f8c r4:85b08c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b08f8c r4:8479b280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85bb0000 r8:8479b2ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8479b280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8479b280 r8:80287e08 r7:ed171e60 r6:8479b300 r5:85bb0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed175fb0 to 0xed175ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8479e440 INFO: task kworker/1:692:6618 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: d06cc000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:84bb2000 Exception stack(0xe05c1fb0 to 0xe05c1ff8) INFO: task kworker/1:693:6621 blocked for more than 478 seconds. r4:85bb0c00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed179e08 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xe05c1d28 to 0xe05c1d70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:694:6623 blocked for more than 478 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:694 state:D stack:0 pid:6623 tgid:6623 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed181d84 r8:00000002 r7:60000113 r6:ed181d8c r5:85bb1800 r4:85bb1800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85bb1800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed181e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8479e980 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85bb1800 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85b09b8c r4:85b09800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b09b8c r4:8479b480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85bb1800 r8:8479b4ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8479b480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8479b480 r8:80287e08 r7:ed179e60 r6:8479b500 r5:85bb1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed181fb0 to 0xed181ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8479e380 INFO: task kworker/1:694:6623 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) 1d60: 80230ad0 80239bb0 800f0013 ffffffff r4:00000000 r5:84be0b8c r4:84be0800 r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:84ba8980 Workqueue: events bpf_prog_free_deferred [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:8479b580 r8:80287e08 r7:ed181e60 r6:8479b600 r5:85bb2400 r4:8479e700 r4:00000000 1d60: 80230ad0 80239bb0 800f0013 ffffffff r4:e05c1dc0 r5:00001000 r4:dfd53000 r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed189d84 r8:00000002 r7:60000013 r6:ed189d8c r5:85bb3000 r4:85bb3000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85bb3000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed189e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8479e900 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85bb3000 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc7f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85b0a38c r4:85b0a000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b0a38c r4:8479b700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85bb3000 r8:8479b72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8479b700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8479b700 r8:80287e08 r7:ed185e60 r6:8479b780 r5:85bb3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed189fb0 to 0xed189ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8479e900 INFO: task kworker/1:696:6627 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: d1a20000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 1d20: d1d4f000 dfb47000 00000001 80239b98 7f2fb000 00000001 r4:e05c1dc0 r5:84be0b8c r4:84be0800 r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 INFO: task kworker/1:698:6631 blocked for more than 478 seconds. r4:85bb4800 r5:85bb4800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed191e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847aaf80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85bb4800 r7:00000000 r6:83018200 r5:00001000 r4:7f055000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85b0af8c r4:85b0ac00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b0af8c r4:8479b880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85bb4800 r8:8479b8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8479b880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8479b880 r8:80287e08 r7:ed18de60 r6:8479b900 r5:85bb4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed191fb0 to 0xed191ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8479ebc0 INFO: task kworker/1:698:6631 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: d1d4f000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 INFO: task kworker/1:699:6633 blocked for more than 478 seconds. r4:85bb5400 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed195e08 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: 1d20: d1e9f000 dfb47000 00000001 80239b98 7f2fb000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r4:00000000 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85b0b38c r4:85b0b000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b0b38c r4:8479ba80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85bb6000 r8:8479baac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8479ba80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8479ba80 r8:80287e08 r7:ed191e60 r6:8479bb00 r5:85bb6000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed17dfb0 to 0xed17dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8479eec0 INFO: task kworker/1:700:6634 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: d1e9f000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:701:6637 blocked for more than 478 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:701 state:D stack:0 pid:6637 tgid:6637 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed199d84 r8:00000002 r7:60000013 r6:ed199d8c r5:85bb6c00 r4:85bb6c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85bb6c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed199e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84822300 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85bb6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece31000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:8479bb80 r8:80287e08 r7:ed17de60 r6:8479bc00 r5:85bb6c00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xe05c1d28 to 0xe05c1d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/1:702:6639 blocked for more than 478 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:702 state:D stack:0 pid:6639 tgid:6639 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed1a1d84 r8:00000002 r7:60000113 r6:ed1a1d8c r5:85bb8000 r4:85bb8000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85bb8000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed1a1e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84822780 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85bb8000 r7:00000000 r6:83018200 r5:00001000 r4:7f09f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecfad000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c0038c r4:85c00000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c0038c r4:8479bc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85bb8000 r8:8479bcac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8479bc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8479bc80 r8:80287e08 r7:ed199e60 r6:8479bd00 r5:85bb8000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed1a1fb0 to 0xed1a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84822180 INFO: task kworker/1:702:6639 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 1d20: d2154000 dfb47000 00000001 80239b98 7f2fb000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed19de08 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xe05c1d28 to 0xe05c1d70) r4:82ac21e4 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xe05c1fb0 to 0xe05c1ff8) INFO: task kworker/1:704:6642 blocked for more than 478 seconds. r5:85bb9800 r4:8291a680 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed1a5e08 r5:00001000 r4:ecf49000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:8479be80 r8:80287e08 r7:ed1a1e60 r6:8479bf00 r5:85bb9800 task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: d2552000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:705:6645 blocked for more than 478 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:705 state:D stack:0 pid:6645 tgid:6645 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed1a9d84 r8:00000002 r7:60000013 r6:ed1a9d8c r5:85bba400 r4:85bba400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85bba400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed1a9e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84822580 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85bba400 r7:00000000 r6:83018200 r5:00001000 r4:7f0ad000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecfb7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c0078c r4:85c00400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c0078c r4:8479bf80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85bba400 r8:8479bfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xe05c1d28 to 0xe05c1d70) r4:82ac21e4 r4:00000000 r5:84be0b8c r4:84be0800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85bbb000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed1b1e08 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c00f8c r4:84911080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85bbb000 r8:849110ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84911080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84911080 r8:80287e08 r7:ed1a9e60 r6:84911100 r5:85bbb000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed1b1fb0 to 0xed1b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84822740 INFO: task kworker/1:706:6647 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: d2a99000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:85bbbc00 r4:8291a680 r4:00000000 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c00b8c r4:85c00800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-rc7-syzkaller #0 r10:8291a684 r9:ed1b9d84 r8:00000002 r7:60000113 r6:ed1b9d8c r5:85bbc800 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:85bbc800 r8:849112ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: 1d20: d2b79000 dfb47000 00000001 80239b98 7f2fb000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:709:6653 blocked for more than 479 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:709 state:D stack:0 pid:6653 tgid:6653 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed1bdd84 r8:00000002 r7:60000013 r6:ed1bdd8c r5:85bbd400 r4:85bbd400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85bbd400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed1bde08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84822ec0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85bbd400 r7:00000000 r6:83018200 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb5b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c0178c r4:85c01400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c0178c r4:84911380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85bbd400 r8:849113ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84911380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84911380 r8:80287e08 r7:ed1b9e60 r6:84911400 r5:85bbd400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed1bdfb0 to 0xed1bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84822b80 INFO: task kworker/1:709:6653 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: d2e89000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:00001000 r4:dfd53000 r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb36d000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:84911480 r8:80287e08 r7:ed1bde60 r6:84911500 r5:85bbe000 task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: d3068000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:711:6657 blocked for more than 479 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:711 state:D stack:0 pid:6657 tgid:6657 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecec5d84 r8:00000002 r7:60000113 r6:ecec5d8c r5:85bbec00 r4:85bbec00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85bbec00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecec5e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85833140 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:85c01f8c r4:84911580 r10:00000000 r9:84911580 r8:80287e08 r7:ed1c1e60 r6:84911600 r5:85bbec00 r4:84822e40 Call trace: Exception stack(0xe05c1d28 to 0xe05c1d70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:84bb2000 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-rc7-syzkaller #0 r5:85bc0000 r4:8291a680 r4:00000000 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:85bc0000 r8:849116ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 1d60: 80230ad0 80239bb0 800f0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85833440 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85bc0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f069000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc6d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c0278c r4:85c02400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c0278c r4:84911780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85bc0c00 r8:849117ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84911780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84911780 r8:80287e08 r7:ed0b9e60 r6:84911800 r5:85bc0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed0c1fb0 to 0xed0c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85833100 INFO: task kworker/1:713:6661 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: d39db000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:714:6663 blocked for more than 479 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:714 state:D stack:0 pid:6663 tgid:6663 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed149d84 r8:00000002 r7:60000013 r6:ed149d8c r5:85bc1800 r4:85bc1800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85bc1800 r4:8291a680 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed149e08 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:84911880 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe05c1d28 to 0xe05c1d70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:715:6665 blocked for more than 479 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:715 state:D stack:0 pid:6665 tgid:6665 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:85c0338c r4:84911980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85bc2400 r8:849119ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84911980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84911980 r8:80287e08 r7:ed149e60 r6:84911a00 r5:85bc2400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed1c5fb0 to 0xed1c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85833480 INFO: task kworker/1:715:6665 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: d3e56000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:84ba8980 Workqueue: events bpf_prog_free_deferred [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:85bc3000 r8:84911aac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed1c9fb0 to 0xed1c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85833580 INFO: task kworker/1:716:6668 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: d3e56000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 INFO: task kworker/1:717:6669 blocked for more than 479 seconds. r5:85bc4800 r4:8291a680 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85833a40 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 1d20: d406d000 dfb47000 00000001 80239b98 7f2fb000 00000001 r4:82ac21e4 r4:00000000 r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:718:6671 blocked for more than 479 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:718 state:D stack:0 pid:6671 tgid:6671 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed1d5d84 r8:00000002 r7:60000013 r6:ed1d5d8c r5:85ad2400 r4:85ad2400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85ad2400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed1d5e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85833f40 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85ad2400 r7:00000000 r6:83018200 r5:00001000 r4:7f081000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec96b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c0c38c r4:85c0c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c0c38c r4:84911c80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:84911c80 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xe05c1d28 to 0xe05c1d70) r4:82ac21e4 r4:00000000 r5:84be0b8c r4:84be0800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:719:6673 blocked for more than 479 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:719 state:D stack:0 pid:6673 tgid:6673 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed1d1d84 r8:00000002 r7:60000113 r6:ed1d1d8c r5:85ad3000 r4:85ad3000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85ad3000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed1d1e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85833cc0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85ad3000 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c03b8c r4:85c03800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c03b8c r4:84911d00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85ad3000 r8:84911d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84911d00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84911d00 r8:80287e08 r7:ed1d5e60 r6:85a7a100 r5:85ad3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:720:6676 blocked for more than 479 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:720 state:D stack:0 pid:6676 tgid:6676 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed1d9d84 r8:00000002 r7:60000113 r6:ed1d9d8c r5:85ad3c00 r4:85ad3c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85ad3c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed1d9e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85833dc0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85ad3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec911000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c03f8c r4:85c03c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:84911d80 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 Exception stack(0xe05c1fb0 to 0xe05c1ff8) INFO: task kworker/1:721:6678 blocked for more than 479 seconds. r10:8291a684 r9:ed1ddd84 r8:00000002 r7:60000013 r6:ed1ddd8c r5:85ad4800 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:85c0c78c r4:84911e00 r10:00000000 r9:84911e00 r8:80287e08 r7:ed1d5e60 r6:85a7a200 r5:85ad4800 task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: d4c6d000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 INFO: task kworker/1:722:6680 blocked for more than 479 seconds. r5:85ad5400 r4:8291a680 r4:00000000 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c0cb8c r4:85c0c800 r10:61c88647 r9:85ad5400 r8:84911eac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 1d20: d4c6d000 dfb47000 00000001 80239b98 7f2fb000 00000001 r4:e05c1dc0 r5:00001000 r4:dfd53000 r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:84911f00 r8:80287e08 r7:ed1e1e60 r6:85a7a300 r5:85ad6000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xe05c1d28 to 0xe05c1d70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:724:6684 blocked for more than 479 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:724 state:D stack:0 pid:6684 tgid:6684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed1e9d84 r8:00000002 r7:60000013 r6:ed1e9d8c r5:85ad6c00 r4:85ad6c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85ad6c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed1e9e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85820540 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85ad6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0b9000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb79000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c0d38c r4:85c0d000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c0d38c r4:84911f80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85ad6c00 r8:84911fac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84911f80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84911f80 r8:80287e08 r7:ed1e5e60 r6:85a7a380 r5:85ad6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed1e9fb0 to 0xed1e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:858200c0 INFO: task kworker/1:724:6684 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: d5000000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r5:84be0b8c r4:84be0800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:85ad1800 r4:8291a680 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb9d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c0d78c r4:85c0d400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c0d78c r4:8581e000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85ad1800 r8:8581e02c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8581e000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8581e000 r8:80287e08 r7:ed1e9e60 r6:85a7a400 r5:85ad1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed1edfb0 to 0xed1edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85820400 INFO: task kworker/1:725:6686 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: d53d8000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-rc7-syzkaller #0 r4:85ad0c00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed1f1e08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:8581e080 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Exception stack(0xe05c1d28 to 0xe05c1d70) r4:82ac21e4 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:84bb2000 Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:727:6690 blocked for more than 479 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:727 state:D stack:0 pid:6690 tgid:6690 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed1f5d84 r8:00000002 r7:60000113 r6:ed1f5d8c r5:848a1800 r4:848a1800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848a1800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed1f5e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85820a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f0cd000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc0d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c0df8c r4:85c0dc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c0df8c r4:8581e100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848a1800 r8:8581e12c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8581e100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8581e100 r8:80287e08 r7:ed1f1e60 r6:85a7a500 r5:848a1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed1f5fb0 to 0xed1f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85820700 INFO: task kworker/1:727:6690 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: d53d8000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:728:6692 blocked for more than 479 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:728 state:D stack:0 pid:6692 tgid:6692 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed1f9d84 r8:00000002 r7:60000113 r6:ed1f9d8c r5:848a6c00 r4:848a6c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848a6c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed1f9e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85820b00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848a6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0d1000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc31000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c0e38c r4:85c0e000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c0e38c r4:8581e180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848a6c00 r8:8581e1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8581e180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8581e180 r8:80287e08 r7:ed1f5e60 r6:85a7a580 r5:848a6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed1f9fb0 to 0xed1f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85820800 INFO: task kworker/1:728:6692 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: d5e24000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-rc7-syzkaller #0 r5:84918000 r4:8291a680 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c0eb8c r4:85c0e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:8581e200 r8:80287e08 r7:ed1f9e60 r6:85a7a600 r5:84918000 task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 1d60: 80230ad0 80239bb0 800f0013 ffffffff r4:e05c1dc0 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:730:6695 blocked for more than 479 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:730 state:D stack:0 pid:6695 tgid:6695 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed1add84 r8:00000002 r7:60000013 r6:ed1add8c r5:85bc6000 r4:85bc6000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85bc6000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed1ade08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85820cc0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85bc6000 r7:00000000 r6:83018200 r5:00001000 r4:7f0d3000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecec9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c0e78c r4:85c0e400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c0e78c r4:8581e280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85bc6000 r8:8581e2ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8581e280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8581e280 r8:80287e08 r7:ed1fde60 r6:8581e300 r5:85bc6000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed1adfb0 to 0xed1adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:858209c0 INFO: task kworker/1:730:6695 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: d5e24000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:00000000 r5:84be0b8c r4:84be0800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:84ba8980 Workqueue: events bpf_prog_free_deferred r5:85bc6c00 r4:8291a680 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:85bc6c00 r8:8581e3ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe05c1d28 to 0xe05c1d70) r5:800f0013 r4:80239bb0 r4:e05c1dc0 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 INFO: task kworker/1:732:6700 blocked for more than 479 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:732 state:D stack:0 pid:6700 tgid:6700 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed209d84 r8:00000002 r7:60000113 r6:ed209d8c r5:85bc3c00 r4:85bc3c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85bc3c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed209e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858339c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85bc3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0d9000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed01b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c0ef8c r4:85c0ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c0ef8c r4:8581e480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85bc3c00 r8:8581e4ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8581e480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8581e480 r8:80287e08 r7:ed1fde60 r6:8581e500 r5:85bc3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed209fb0 to 0xed209ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:858203c0 INFO: task kworker/1:732:6700 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: d6859000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 INFO: task kworker/1:733:6701 blocked for more than 479 seconds. r4:85bd0c00 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:ed02f000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:85bd0c00 r8:8581e5ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xe05c1d28 to 0xe05c1d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:734:6703 blocked for more than 479 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:734 state:D stack:0 pid:6703 tgid:6703 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed211d84 r8:00000002 r7:60000113 r6:ed211d8c r5:85bd1800 r4:85bd1800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85bd1800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed211e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:85bd1800 r8:8581e6ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/1:735 state:D stack:0 pid:6706 tgid:6706 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed215d84 r8:00000002 r7:60000013 r6:ed215d8c r5:85bd3000 r4:85bd3000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85bd3000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed215e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858266c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85bd3000 r7:00000000 r6:83018200 r5:00001000 r4:7f0df000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed087000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c0fb8c r4:85c0f800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c0fb8c r4:8581e780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85bd3000 r8:8581e7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8581e780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8581e780 r8:80287e08 r7:ed211e60 r6:8581e800 r5:85bd3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed215fb0 to 0xed215ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85826340 INFO: task kworker/1:735:6706 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: d6859000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:736:6708 blocked for more than 479 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:736 state:D stack:0 pid:6708 tgid:6708 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed219d84 r8:00000002 r7:60000113 r6:ed219d8c r5:85bd0000 r4:85bd0000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85bd0000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed219e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:85bd0000 r8:8581e8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xed219fb0 to 0xed219ff8) r4:85826280 r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 Exception stack(0xe05c1fb0 to 0xe05c1ff8) INFO: task kworker/1:737:6709 blocked for more than 479 seconds. r5:85bd3c00 r4:8291a680 r4:00000000 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85826980 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85bd3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0e1000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed09f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c0ff8c r4:85c0fc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c0ff8c r4:8581e980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85bd3c00 r8:8581e9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8581e980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8581e980 r8:80287e08 r7:ed219e60 r6:85a7a680 r5:85bd3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed21dfb0 to 0xed21dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85826280 INFO: task kworker/1:737:6709 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: d70e6000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed229e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85826bc0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84918c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0e5000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed0c5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c1478c r4:85c14400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c1478c r4:8581ea00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84918c00 r8:8581ea2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8581ea00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8581ea00 r8:80287e08 r7:ed219e60 r6:85a7a700 r5:84918c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed229fb0 to 0xed229ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:858268c0 INFO: task kworker/1:738:6712 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: d70e6000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r5:84be0b8c r4:84be0800 r4:84bb2000 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-rc7-syzkaller #0 r4:84919800 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed231e08 r5:00001000 r4:ed0d7000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:85c14b8c r4:8581ea80 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 1d60: 80230ad0 80239bb0 800f0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:740:6715 blocked for more than 479 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:740 state:D stack:0 pid:6715 tgid:6715 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed235d84 r8:00000002 r7:60000013 r6:ed235d8c r5:8491b000 r4:8491b000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8491b000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed235e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85831680 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8491b000 r7:00000000 r6:83018200 r5:00001000 r4:7f02b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf3d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c16b8c r4:85c16800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c16b8c r4:8581eb00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8491b000 r8:8581eb2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8581eb00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8581eb00 r8:80287e08 r7:ed231e60 r6:85a7a800 r5:8491b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed235fb0 to 0xed235ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85826c80 INFO: task kworker/1:740:6715 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: d741c000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:742:6722 blocked for more than 479 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:742 state:D stack:0 pid:6722 tgid:6722 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed201d84 r8:00000002 r7:60000013 r6:ed201d8c r5:8491c800 r4:8491c800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8491c800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed201e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85833fc0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8491c800 r7:00000000 r6:83018200 r5:00001000 r4:7f0ef000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed11b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c15b8c r4:85c15800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c15b8c r4:8581ec00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8491c800 r8:8581ec2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8581ec00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8581ec00 r8:80287e08 r7:ed235e60 r6:85a7a900 r5:8491c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed201fb0 to 0xed201ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85826b00 INFO: task kworker/1:742:6722 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: d7836000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:743:6723 blocked for more than 479 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:743 state:D stack:0 pid:6723 tgid:6723 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed22dd84 r8:00000002 r7:60000113 r6:ed22dd8c r5:8491d400 r4:8491d400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8491d400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed22de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858315c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8491d400 r7:00000000 r6:83018200 r5:00001000 r4:7f029000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb3b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c1678c r4:85c16400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c1678c r4:8581ec80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8491d400 r8:8581ecac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 1d20: d824e000 dfb47000 00000001 80239b98 7f2fb000 00000001 r4:82ac21e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ba8980 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:744:6728 blocked for more than 479 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:744 state:D stack:0 pid:6728 tgid:6728 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed245d84 r8:00000002 r7:60000113 r6:ed245d8c r5:8491a400 r4:8491a400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8491a400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed245e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85831800 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8491a400 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb707000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c16f8c r4:85c16c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c16f8c r4:8581ed00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8491a400 r8:8581ed2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8581ed00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8581ed00 r8:80287e08 r7:ed235e60 r6:85a7aa00 r5:8491a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed245fb0 to 0xed245ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85831500 INFO: task kworker/1:744:6728 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: d824e000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:84bb202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84ba8980 r5:8491ec00 r4:8291a680 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c1838c r4:85c18000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c1838c r4:8581ed80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8491ec00 r8:8581edac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8581ed80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8581ed80 r8:80287e08 r7:ed245e60 r6:85a7aa80 r5:8491ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed24dfb0 to 0xed24dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) Exception stack(0xe05c1fb0 to 0xe05c1ff8) INFO: task kworker/1:746:6732 blocked for more than 479 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:746 state:D stack:0 pid:6732 tgid:6732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed255d84 r8:00000002 r7:60000113 r6:ed255d8c r5:85be0c00 r4:85be0c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85be0c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed255e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r5:00001000 r4:eb989000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xed255fb0 to 0xed255ff8) r4:00000000 r5:800f0013 r4:80239bb0 r4:00000000 r7:ddde2d80 r6:83018200 r5:84be0b8c r4:84bb2000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 r5:00001000 r4:ebb5d000 r5:85c1778c r4:85c17400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c1778c r4:8581ef00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85be1800 r8:8581ef2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8581ef00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8581ef00 r8:80287e08 r7:ed24de60 r6:85a7ab80 r5:85be1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed259fb0 to 0xed259ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:858319c0 INFO: task kworker/1:747:6733 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: d882b000 dfb47000 00000001 80239b98 7f2fb000 00000001 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r10:00000000 r9:84bb2000 r8:80287e08 r7:e05b5e60 r6:84bc4080 r5:84b08c00 task:kworker/1:748 state:D stack:0 pid:6735 tgid:6735 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85831a80 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85831b00 INFO: task kworker/1:748:6735 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84b08c00 r8:80200be4 r7:e05c1d5c r6:ffffffff r5:84b08c00 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05c1d28 to 0xe05c1d70) 1d20: d882b000 dfb47000 00000001 80239b98 7f2fb000 00000001 1d40: 82ac15a0 7f2fb000 dfb47000 8280c928 82ac21c4 e05c1da4 e05c1da8 e05c1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05c1dc0 r5:e05c1e08 r4:e05c1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be0b8c r4:84be0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85831c80 r5:85c17f8c r4:85c17c00 r4:8581ee80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8581ee80 r8:80287e08 r7:ed24de60 r6:85a7ac80 r5:85be2400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed269fb0 to 0xed269ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:858317c0 INFO: task kworker/1:749:6737 is blocked on a mutex likely owned by task kworker/1:204:3660. task:kworker/1:204 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)